INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df83dd84 r8:00000002 r7:60000013 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf33000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d0f8c r4:859d0c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d0f8c r4:830b8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ecf4 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 95439000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:2:95 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:95 tgid:95 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9b5d84 r8:00000002 r7:60000013 r6:df9b5d8c r5:83300c00 r4:83300c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83300c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ca40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83300c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb238c r4:832bd900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83300c00 r8:832bd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832bd900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd900 r8:8027ecf4 r7:df879e60 r6:832bd980 r5:83300c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b5fb0 to 0xdf9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832c2780 INFO: task kworker/1:2:95 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 96033000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/0:1:3096 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3096 tgid:3096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:83b46000 r4:83b46000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b46000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494da40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b46000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec927000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d3b8c r4:859d3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d3b8c r4:847aee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b46000 r8:847aeeac r7:82804d40 r6:dddced40 r5:dddced60 r4:847aee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aee80 r8:8027ecf4 r7:df911e60 r6:847aed80 r5:83b46000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8482af40 INFO: task kworker/0:1:3096 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 96e55000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:0:3101 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3101 tgid:3101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df881d84 r8:00000002 r7:60000113 r6:df881d8c r5:83b45400 r4:83b45400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b45400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df881e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b45400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1b8c r4:844c3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b45400 r8:844c30ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:844c3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844c3080 r8:8027ecf4 r7:df9b5e60 r6:847aef00 r5:83b45400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf881fb0 to 0xdf881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84808100 INFO: task kworker/1:0:3101 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9960b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/0:5:3121 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f5d84 r8:00000002 r7:60000013 r6:df9f5d8c r5:83b40000 r4:83b40000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b40000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b40000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc89000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d4f8c r4:851d4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d4f8c r4:847aea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b40000 r8:847aeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:847aea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aea80 r8:8027ecf4 r7:df9a1e60 r6:847aeb00 r5:83b40000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845e2d40 INFO: task kworker/0:5:3121 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9b9e3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:3:3124 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83aaec00 r4:83aaec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aaec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aaec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb178c r4:84bb1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb178c r4:8472ef80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aaec00 r8:8472efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8472ef80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472ef80 r8:8027ecf4 r7:df9b5e60 r6:844c3000 r5:83aaec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8472c400 INFO: task kworker/1:3:3124 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9c31f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/0:7:3125 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa0dd84 r8:00000002 r7:60000013 r6:dfa0dd8c r5:83240000 r4:83240000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505cc40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0457000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ef78c r4:841ef400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ef78c r4:842bd580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:842bd5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:842bd580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842bd580 r8:8027ecf4 r7:df9f5e60 r6:842bd600 r5:83240000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845bfa80 INFO: task kworker/0:7:3125 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9cbf7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:4:3128 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:84288c00 r4:84288c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84288c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd338c r4:84bd3000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd338c r4:8482c000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:8482c02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c000 r8:8027ecf4 r7:df9b5e60 r6:838a2180 r5:84288c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848169c0 INFO: task kworker/1:4:3128 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9d695000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:5:3130 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:840c1800 r4:840c1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840c1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ded40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae15000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c4b8c r4:847c4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c4b8c r4:8482c080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840c1800 r8:8482c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c080 r8:8027ecf4 r7:dfa21e60 r6:838a2080 r5:840c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:845d3a40 INFO: task kworker/1:5:3130 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9df1f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 INFO: task kworker/1:6:3131 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:83ab5400 r4:83ab5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ab5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a15c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa25000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cb8c r4:8515c800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515cb8c r4:8482c100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab5400 r8:8482c12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c100 r8:8027ecf4 r7:dfa2de60 r6:838a2200 r5:83ab5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84827d40 INFO: task kworker/1:6:3131 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9ebf6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3133 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83aa6c00 r4:83aa6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb93000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519378c r4:85193400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519378c r4:8482c180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6c00 r8:8482c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c180 r8:8027ecf4 r7:dfa2de60 r6:8482c200 r5:83aa6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab100 INFO: task kworker/1:7:3133 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f0cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3136 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:83aa4800 r4:83aa4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa4800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb387000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d2b8c r4:859d2800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d2b8c r4:838a2300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa4800 r8:838a232c r7:82804d40 r6:dddced40 r5:dddced60 r4:838a2300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2300 r8:8027ecf4 r7:df9f5e60 r6:8482c280 r5:83aa4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1080 INFO: task kworker/0:8:3136 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f0cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa55d84 r8:00000002 r7:60000013 r6:dfa55d8c r5:83aa2400 r4:83aa2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852884c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520278c r4:85202400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520278c r4:830cd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa2400 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ecf4 r7:dfa51e60 r6:8482c300 r5:83aa2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1080 INFO: task kworker/0:9:3137 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f0cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:83aa1800 r4:83aa1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf55000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526078c r4:85260400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526078c r4:8482c380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa1800 r8:8482c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c380 r8:8027ecf4 r7:dfa2de60 r6:8482c400 r5:83aa1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab500 INFO: task kworker/1:8:3140 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9f6e7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f1d84 r8:00000002 r7:60000013 r6:df9f1d8c r5:83aa5400 r4:83aa5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa5400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526a78c r4:8526a400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526a78c r4:8482c500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa5400 r8:8482c52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c500 r8:8027ecf4 r7:dfa4de60 r6:8482c580 r5:83aa5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab580 INFO: task kworker/1:9:3142 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9fd29000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3144 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:83aa6000 r4:83aa6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa6000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c5f8c r4:847c5c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c5f8c r4:8482c480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:8482c4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c480 r8:8027ecf4 r7:df9f1e60 r6:8482c600 r5:83aa6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab780 INFO: task kworker/1:10:3144 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9fd29000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:83aa0000 r4:83aa0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abc80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa0000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ab38c r4:853ab000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ab38c r4:8482c680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa0000 r8:8482c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c680 r8:8027ecf4 r7:dfa71e60 r6:8482c700 r5:83aa0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab780 INFO: task kworker/1:11:3146 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: 9fecc000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa99d84 r8:00000002 r7:60000013 r6:dfa99d8c r5:8386e000 r4:8386e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8386e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b5600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa73000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530fb8c r4:8530f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530fb8c r4:830cd280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8386e000 r8:830cd2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027ecf4 r7:dfa51e60 r6:8482c780 r5:8386e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1540 INFO: task kworker/0:10:3148 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0096000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:83aa0c00 r4:83aa0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abb8c r4:853ab800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853abb8c r4:8482c800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa0c00 r8:8482c82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c800 r8:8027ecf4 r7:dfa71e60 r6:8482c880 r5:83aa0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847abdc0 INFO: task kworker/1:12:3150 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a024f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3153 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:8387bc00 r4:8387bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8387bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568b880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8387bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb359000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d3f8c r4:853d3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d3f8c r4:8482c900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8387bc00 r8:8482c92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c900 r8:8027ecf4 r7:dfa71e60 r6:830cd100 r5:8387bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8080 INFO: task kworker/1:13:3153 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a03b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac9d84 r8:00000002 r7:60000013 r6:dfac9d8c r5:8387e000 r4:8387e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8387e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8387e000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d178c r4:853d1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d178c r4:8482c980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8387e000 r8:8482c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482c980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482c980 r8:8027ecf4 r7:dfac1e60 r6:830cd400 r5:8387e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8080 INFO: task kworker/1:14:3155 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a03b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3156 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8387ec00 r4:8387ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8387ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526c00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8387ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb721000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555d38c r4:8555d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555d38c r4:8482ca00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8387ec00 r8:8482ca2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482ca00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482ca00 r8:8027ecf4 r7:dfac1e60 r6:830cd080 r5:8387ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8240 INFO: task kworker/1:15:3156 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0682000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3158 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83aa3000 r4:83aa3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563e680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb035000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d2f8c r4:853d2c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d2f8c r4:8482ca80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3000 r8:8482caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482ca80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482ca80 r8:8027ecf4 r7:dfac1e60 r6:8482cb00 r5:83aa3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8180 INFO: task kworker/1:16:3158 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a083a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3161 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:832ec800 r4:832ec800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832ec800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855540 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb155000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572bf8c r4:8572bc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8572bf8c r4:8482cb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ec800 r8:8482cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482cb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482cb80 r8:8027ecf4 r7:dfac1e60 r6:8482cc00 r5:832ec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8640 INFO: task kworker/1:17:3161 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0cc0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3162 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:832e8c00 r4:832e8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832e8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578f880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571838c r4:85718000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8571838c r4:8482cc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8c00 r8:8482ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482cc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482cc80 r8:8027ecf4 r7:dfad9e60 r6:8482cd00 r5:832e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8640 INFO: task kworker/1:18:3162 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a0cc0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3165 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:840be000 r4:840be000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840be000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a88b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840be000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ad000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857edf8c r4:857edc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857edf8c r4:8482cd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840be000 r8:8482cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482cd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482cd80 r8:8027ecf4 r7:dfad9e60 r6:8482ce00 r5:840be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8740 INFO: task kworker/1:19:3165 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1213000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3166 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:840bd400 r4:840bd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840bd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a8900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ecb8c r4:857ec800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ecb8c r4:8482ce80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840bd400 r8:8482ceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8482ce80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482ce80 r8:8027ecf4 r7:dfaf1e60 r6:8482cf00 r5:840bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8740 INFO: task kworker/1:20:3166 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1213000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3168 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:840bc800 r4:840bc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840bc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d1f8c r4:859d1c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d1f8c r4:830cd380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840bc800 r8:830cd3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd380 r8:8027ecf4 r7:dfa51e60 r6:8482cf80 r5:840bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1e80 INFO: task kworker/0:11:3168 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a169e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3170 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:840b9800 r4:840b9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840b9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b3dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c178c r4:850c1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c178c r4:84749000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840b9800 r8:8474902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749000 r8:8027ecf4 r7:dfaf1e60 r6:84749080 r5:840b9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a89c0 INFO: task kworker/1:21:3170 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a19d1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3172 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:840bec00 r4:840bec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840bec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592c940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85810f8c r4:85810c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85810f8c r4:84749100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840bec00 r8:8474912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749100 r8:8027ecf4 r7:dfb15e60 r6:84749180 r5:840bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8b40 INFO: task kworker/1:22:3172 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1c3b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3173 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:840b8000 r4:840b8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840b8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b37c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec667000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85902b8c r4:85902800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85902b8c r4:84749200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840b8000 r8:8474922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749200 r8:8027ecf4 r7:dfb21e60 r6:84749280 r5:840b8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a8d80 INFO: task kworker/1:23:3173 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1c3b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3176 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83304800 r4:83304800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83304800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83304800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7cf8c r4:85a7cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7cf8c r4:84749300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83304800 r8:8474932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749300 r8:8027ecf4 r7:dfb21e60 r6:84749380 r5:83304800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab0c0 INFO: task kworker/1:24:3176 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a1ee4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3178 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:84918000 r4:84918000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84918000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549cc40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84918000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea783000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581238c r4:85812000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8581238c r4:84749400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84918000 r8:8474942c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749400 r8:8027ecf4 r7:dfb39e60 r6:84749480 r5:84918000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493f080 INFO: task kworker/1:25:3178 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2136000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3179 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb41d84 r8:00000002 r7:60000113 r6:dfb41d8c r5:84918c00 r4:84918c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84918c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85887940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84918c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb63000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859f1f8c r4:859f1c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:859f1f8c r4:84749500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84918c00 r8:8474952c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749500 r8:8027ecf4 r7:dfb39e60 r6:84749580 r5:84918c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493f080 INFO: task kworker/1:26:3179 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a228a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3183 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:83878c00 r4:83878c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83878c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdbb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e438c r4:859e4000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e438c r4:830b8700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83878c00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ecf4 r7:dfa51e60 r6:830b8580 r5:83878c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1240 INFO: task kworker/0:12:3183 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a256b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3184 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:83878000 r4:83878000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83878000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b54500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83878000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d2f8c r4:859d2c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d2f8c r4:832a1500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83878000 r8:832a152c r7:82804d40 r6:dddced40 r5:dddced60 r4:832a1500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1500 r8:8027ecf4 r7:dfb2de60 r6:832a1880 r5:83878000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1240 INFO: task kworker/0:13:3184 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a256b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3186 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84768000 r4:84768000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84768000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494d940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84768000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8ff000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d378c r4:859d3400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d378c r4:8459ef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84768000 r8:8459ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8459ef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8459ef00 r8:8027ecf4 r7:dfb2de60 r6:8459ef80 r5:84768000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1240 INFO: task kworker/0:14:3186 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2a57000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3189 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb79d84 r8:00000002 r7:60000013 r6:dfb79d8c r5:84768c00 r4:84768c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84768c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84768c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1bd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cf78c r4:847cf400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847cf78c r4:84749600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84768c00 r8:8474962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749600 r8:8027ecf4 r7:dfb39e60 r6:8459e180 r5:84768c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493f6c0 INFO: task kworker/1:27:3189 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2dad000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3191 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:84769800 r4:84769800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84769800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85392200 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84769800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafaf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539c78c r4:8539c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539c78c r4:84749680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84769800 r8:847496ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749680 r8:8027ecf4 r7:dfb79e60 r6:8459e200 r5:84769800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:28:3191 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2e79000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3193 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:8476b000 r4:8476b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476b000 r7:00000000 r6:83018200 r5:00001000 r4:7f1b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7eb8c r4:85a7e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7eb8c r4:84749700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:8474972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749700 r8:8027ecf4 r7:dfb85e60 r6:8459e500 r5:8476b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:29:3193 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a2e79000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3195 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:8476a400 r4:8476a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476a400 r7:00000000 r6:83018200 r5:00001000 r4:7f1b5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7f38c r4:85a7f000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7f38c r4:84749780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476a400 r8:847497ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749780 r8:8027ecf4 r7:dfb9de60 r6:84944000 r5:8476a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fbc0 INFO: task kworker/1:30:3195 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a341d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3197 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:8476bc00 r4:8476bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7ef8c r4:85a7ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7ef8c r4:84749880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476bc00 r8:847498ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749880 r8:8027ecf4 r7:dfb9de60 r6:84944080 r5:8476bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:31:3197 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a341d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3198 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc1d84 r8:00000002 r7:60000013 r6:dfbc1d8c r5:8476d400 r4:8476d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1d9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b80b8c r4:85b80800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b80b8c r4:84749900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:8474992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749900 r8:8027ecf4 r7:dfb9de60 r6:84944100 r5:8476d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fa00 INFO: task kworker/1:32:3198 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a35e1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3200 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:8476c800 r4:8476c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b39040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb61000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7e78c r4:85a7e400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7e78c r4:84749980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476c800 r8:847499ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749980 r8:8027ecf4 r7:dfbc1e60 r6:84944180 r5:8476c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493fec0 INFO: task kworker/1:33:3200 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3812000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3202 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:8476e000 r4:8476e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8476e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c429c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8476e000 r7:00000000 r6:83018200 r5:00001000 r4:7f34d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b82f8c r4:85b82c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b82f8c r4:84749a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:84749a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749a00 r8:8027ecf4 r7:dfbc1e60 r6:84944200 r5:8476e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942000 INFO: task kworker/1:34:3202 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3b50000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3205 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:84481800 r4:84481800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84481800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849421c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84481800 r7:00000000 r6:83018200 r5:00001000 r4:7f261000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8178c r4:85b81400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8178c r4:84749a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84481800 r8:84749aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749a80 r8:8027ecf4 r7:dfbe1e60 r6:84944280 r5:84481800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942140 INFO: task kworker/1:35:3205 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3f70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3207 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84480c00 r4:84480c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84480c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b59600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84480c00 r7:00000000 r6:83018200 r5:00001000 r4:7f293000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd19000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1878c r4:85b18400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b1878c r4:84749b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84480c00 r8:84749b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749b00 r8:8027ecf4 r7:dfbe1e60 r6:84944300 r5:84480c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942280 INFO: task kworker/1:36:3207 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a3f70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3209 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc11d84 r8:00000002 r7:60000013 r6:dfc11d8c r5:84483000 r4:84483000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84483000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b27c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84483000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec917000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5178c r4:85a51400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a5178c r4:84944380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483000 r8:849443ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944380 r8:8027ecf4 r7:dfb2de60 r6:84944400 r5:84483000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84826c40 INFO: task kworker/0:15:3209 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a467b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3210 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84483c00 r4:84483c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84483c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84483c00 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed315000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8378c r4:85b83400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8378c r4:84749b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483c00 r8:84749bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749b80 r8:8027ecf4 r7:dfbe1e60 r6:84944480 r5:84483c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849423c0 INFO: task kworker/1:37:3210 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a467b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3212 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84482400 r4:84482400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84482400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84482400 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec899000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8338c r4:85b83000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8338c r4:84749c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84482400 r8:84749c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749c00 r8:8027ecf4 r7:dfbe1e60 r6:84944500 r5:84482400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942700 INFO: task kworker/1:38:3212 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a4c2f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3214 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84480000 r4:84480000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84480000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab7ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84480000 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed389000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ba138c r4:85ba1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ba138c r4:84749c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84480000 r8:84749cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749c80 r8:8027ecf4 r7:dfbe1e60 r6:84944580 r5:84480000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942640 INFO: task kworker/1:39:3214 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5045000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3216 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:84484800 r4:84484800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84484800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85abeb80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84484800 r7:00000000 r6:83018200 r5:00001000 r4:7f307000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc19000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8238c r4:85b82000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8238c r4:84749d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84484800 r8:84749d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749d00 r8:8027ecf4 r7:dfc3de60 r6:84944600 r5:84484800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942780 INFO: task kworker/1:40:3216 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5045000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3218 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84486c00 r4:84486c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84486c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84942640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84486c00 r7:00000000 r6:83018200 r5:00001000 r4:7f31b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece69000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8278c r4:85b82400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b8278c r4:84749d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486c00 r8:84749dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749d80 r8:8027ecf4 r7:dfc3de60 r6:84944680 r5:84486c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942ac0 INFO: task kworker/1:41:3218 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a547f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3220 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:84486000 r4:84486000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84486000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c42880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84486000 r7:00000000 r6:83018200 r5:00001000 r4:7f34b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b82b8c r4:85b82800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b82b8c r4:84749e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84486000 r8:84749e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749e00 r8:8027ecf4 r7:dfc3de60 r6:84944700 r5:84486000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942bc0 INFO: task kworker/1:42:3220 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a59b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3223 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:84485400 r4:84485400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84485400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cd400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84485400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859d3f8c r4:859d3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859d3f8c r4:84944780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84485400 r8:849447ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944780 r8:8027ecf4 r7:dfb2de60 r6:84944800 r5:84485400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848261c0 INFO: task kworker/0:16:3223 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5ce6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3224 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:84920000 r4:84920000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d0300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84920000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6878c r4:85e68400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6878c r4:84749f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:84749f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749f00 r8:8027ecf4 r7:dfc3de60 r6:84944880 r5:84920000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942f40 INFO: task kworker/1:43:3224 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a5ce6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3227 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc8dd84 r8:00000002 r7:60000013 r6:dfc8dd8c r5:84920c00 r4:84920c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84920c00 r7:00000000 r6:83018200 r5:00001000 r4:7f42f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee015000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6638c r4:85e66000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6638c r4:84749f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920c00 r8:84749fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749f80 r8:8027ecf4 r7:dfc81e60 r6:84944900 r5:84920c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84942fc0 INFO: task kworker/1:44:3227 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a6312000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3231 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:84921800 r4:84921800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84921800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cde80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec795000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d8f8c r4:841d8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841d8f8c r4:84944980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84921800 r8:849449ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944980 r8:8027ecf4 r7:dfb2de60 r6:84944a00 r5:84921800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959180 INFO: task kworker/0:17:3231 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a650c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3232 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:84922400 r4:84922400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84922400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587a040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84922400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb71000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a74b8c r4:85a74800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a74b8c r4:84944a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84922400 r8:84944aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944a80 r8:8027ecf4 r7:dfb2de60 r6:84944b00 r5:84922400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959180 INFO: task kworker/0:18:3232 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a66b8000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3235 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:84923000 r4:84923000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84923000 r7:00000000 r6:83018200 r5:00001000 r4:7f429000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfe9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6578c r4:85e65400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6578c r4:84749e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923000 r8:84749eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84749e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84749e80 r8:8027ecf4 r7:dfc8de60 r6:84944c00 r5:84923000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84826b40 INFO: task kworker/1:45:3235 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a6872000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3236 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:84923c00 r4:84923c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cd000 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb87000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d8b8c r4:841d8800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841d8b8c r4:84944b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:84944bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84944b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944b80 r8:8027ecf4 r7:dfb2de60 r6:84944c80 r5:84923c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959500 INFO: task kworker/0:19:3236 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a6c14000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3237 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:84924800 r4:84924800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84924800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc1b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841d878c r4:841d8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841d878c r4:84944d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84924800 r8:84944d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84944d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944d00 r8:8027ecf4 r7:dfb2de60 r6:84944d80 r5:84924800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959500 INFO: task kworker/0:20:3237 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7038000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3241 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:84925400 r4:84925400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84925400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858623c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84925400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecddf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e478c r4:859e4400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e478c r4:84944e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84925400 r8:84944e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84944e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944e00 r8:8027ecf4 r7:dfb2de60 r6:84944e80 r5:84925400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959900 INFO: task kworker/0:21:3241 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7038000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3242 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:84926000 r4:84926000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e538c r4:859e5000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e538c r4:84944f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:84944f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84944f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944f00 r8:8027ecf4 r7:dfa1de60 r6:84944f80 r5:84926000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959980 INFO: task kworker/0:22:3242 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a723a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3243 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84926c00 r4:84926c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858624c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84926c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae31000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e4b8c r4:859e4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e4b8c r4:8494e000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926c00 r8:8494e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e000 r8:8027ecf4 r7:dfa6de60 r6:8494e080 r5:84926c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959980 INFO: task kworker/0:23:3243 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a74b1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3246 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:848f8000 r4:848f8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e4f8c r4:859e4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e4f8c r4:8494e100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8000 r8:8494e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e100 r8:8027ecf4 r7:dfa6de60 r6:8494e180 r5:848f8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959cc0 INFO: task kworker/0:24:3246 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a771c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3248 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:848f8c00 r4:848f8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e5b8c r4:859e5800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e5b8c r4:8494e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8c00 r8:8494e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e200 r8:8027ecf4 r7:dfa6de60 r6:8494e280 r5:848f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84959cc0 INFO: task kworker/0:25:3248 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7adf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3250 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:848f9800 r4:848f9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb589000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e578c r4:859e5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e578c r4:8494e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f9800 r8:8494e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e300 r8:8027ecf4 r7:dfa85e60 r6:8494e380 r5:848f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849431c0 INFO: task kworker/0:26:3250 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7adf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3252 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:848fb000 r4:848fb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb827000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e638c r4:859e6000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e638c r4:8494e400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fb000 r8:8494e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e400 r8:8027ecf4 r7:dfa85e60 r6:8494e480 r5:848fb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943340 INFO: task kworker/0:27:3252 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a7f4f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3254 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:848fbc00 r4:848fbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb795000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e5f8c r4:859e5c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e5f8c r4:8494e500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fbc00 r8:8494e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e500 r8:8027ecf4 r7:dfab1e60 r6:8494e580 r5:848fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849432c0 INFO: task kworker/0:28:3254 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a8167000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3255 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:848fc800 r4:848fc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862c40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e678c r4:859e6400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e678c r4:8494e600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fc800 r8:8494e62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e600 r8:8027ecf4 r7:dfab1e60 r6:8494e680 r5:848fc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849432c0 INFO: task kworker/0:29:3255 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a86b2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3258 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:848fd400 r4:848fd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e6b8c r4:859e6800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e6b8c r4:8494e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:8494e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e700 r8:8027ecf4 r7:dfaede60 r6:8494e780 r5:848fd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849436c0 INFO: task kworker/0:30:3258 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a876b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3260 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:848fe000 r4:848fe000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fe000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec487000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e778c r4:859e7400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e778c r4:8494e880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fe000 r8:8494e8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e880 r8:8027ecf4 r7:dfabde60 r6:8494e900 r5:848fe000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943800 INFO: task kworker/0:31:3260 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a910e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3261 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:848fec00 r4:848fec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862e00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e6f8c r4:859e6c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e6f8c r4:8494e980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fec00 r8:8494e9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494e980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494e980 r8:8027ecf4 r7:dfb1de60 r6:8494ea00 r5:848fec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943800 INFO: task kworker/0:32:3261 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a9208000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3264 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:848fa400 r4:848fa400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fa400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862f80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb75000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e738c r4:859e7000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e738c r4:8494ea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fa400 r8:8494eaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494ea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ea80 r8:8027ecf4 r7:dfb1de60 r6:8494eb00 r5:848fa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943b40 INFO: task kworker/0:33:3264 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a9383000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3266 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:849c0000 r4:849c0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8eb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e838c r4:859e8000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e838c r4:8494eb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0000 r8:8494ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494eb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494eb80 r8:8027ecf4 r7:dfb1de60 r6:8494ec00 r5:849c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943c80 INFO: task kworker/0:34:3266 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a9926000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3268 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:849c0c00 r4:849c0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85884640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec767000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e7f8c r4:859e7c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e7f8c r4:8494ec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:8494ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494ec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ec80 r8:8027ecf4 r7:dfca1e60 r6:8494ed00 r5:849c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84943f00 INFO: task kworker/0:35:3268 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a9b21000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3271 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:849c1800 r4:849c1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec895000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cd38c r4:847cd000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:847cd38c r4:8494ed80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:8494edac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494ed80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ed80 r8:8027ecf4 r7:dfca1e60 r6:8494ee00 r5:849c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848121c0 INFO: task kworker/0:36:3271 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: a9e44000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3273 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:8491a400 r4:8491a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e08c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491a400 r7:00000000 r6:83018200 r5:00001000 r4:7f42b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edff5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e65b8c r4:85e65800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e65b8c r4:847aec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491a400 r8:847aecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847aec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847aec80 r8:8027ecf4 r7:dfc8de60 r6:84966000 r5:8491a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84946bc0 INFO: task kworker/1:46:3273 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aa149000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3274 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfce1d84 r8:00000002 r7:60000113 r6:dfce1d8c r5:8491d400 r4:8491d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858810c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491d400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec925000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e8b8c r4:859e8800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e8b8c r4:8494ee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491d400 r8:8494eeac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494ee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ee80 r8:8027ecf4 r7:dfca1e60 r6:84966080 r5:8491d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812100 INFO: task kworker/0:37:3274 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aa205000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3275 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:8491bc00 r4:8491bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e878c r4:859e8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e878c r4:8494ef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491bc00 r8:8494ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8494ef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ef00 r8:8027ecf4 r7:dfce1e60 r6:84966100 r5:8491bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812100 INFO: task kworker/0:38:3275 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aa205000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3278 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd01d84 r8:00000002 r7:60000113 r6:dfd01d8c r5:8491c800 r4:8491c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc29000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e978c r4:859e9400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e978c r4:8494ef80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491c800 r8:8494efac r7:82804d40 r6:dddced40 r5:dddced60 r4:8494ef80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494ef80 r8:8027ecf4 r7:dfce1e60 r6:84966180 r5:8491c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812300 INFO: task kworker/0:39:3278 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aa4fa000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3279 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:8491b000 r4:8491b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491b000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca01000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e8f8c r4:859e8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e8f8c r4:8482e000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491b000 r8:8482e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e000 r8:8027ecf4 r7:dfd01e60 r6:84966200 r5:8491b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812440 INFO: task kworker/0:40:3279 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aa74f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3282 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd21d84 r8:00000002 r7:60000113 r6:dfd21d8c r5:8491e000 r4:8491e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca75000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e938c r4:859e9000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e938c r4:8482e080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491e000 r8:8482e0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e080 r8:8027ecf4 r7:dfd01e60 r6:84966280 r5:8491e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd21fb0 to 0xdfd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848126c0 INFO: task kworker/0:41:3282 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aac09000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3283 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:8491ec00 r4:8491ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc59000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e9b8c r4:859e9800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e9b8c r4:8482e100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491ec00 r8:8482e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e100 r8:8027ecf4 r7:dfd01e60 r6:84966300 r5:8491ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812740 INFO: task kworker/0:42:3283 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aadec000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3286 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:83301800 r4:83301800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83301800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881a00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83301800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859e9f8c r4:859e9c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859e9f8c r4:8482e180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83301800 r8:8482e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e180 r8:8027ecf4 r7:dfd29e60 r6:84966380 r5:83301800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848127c0 INFO: task kworker/0:43:3286 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ab086000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3287 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd45d84 r8:00000002 r7:60000113 r6:dfd45d8c r5:84919800 r4:84919800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84919800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881b00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84919800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ea38c r4:859ea000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ea38c r4:8482e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84919800 r8:8482e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e200 r8:8027ecf4 r7:dfd41e60 r6:84966400 r5:84919800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd45fb0 to 0xdfd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848128c0 INFO: task kworker/0:44:3287 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ab2b3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3290 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3290 tgid:3290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd65d84 r8:00000002 r7:60000113 r6:dfd65d8c r5:84928000 r4:84928000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84928000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859eaf8c r4:859eac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859eaf8c r4:8482e280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928000 r8:8482e2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e280 r8:8027ecf4 r7:dfd45e60 r6:84966480 r5:84928000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd65fb0 to 0xdfd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812b80 INFO: task kworker/0:45:3290 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ab438000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3291 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:849c3000 r4:849c3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881c40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ea78c r4:859ea400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ea78c r4:8482e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3000 r8:8482e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e300 r8:8027ecf4 r7:dfd65e60 r6:8482e380 r5:849c3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812b80 INFO: task kworker/0:46:3291 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ab656000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3293 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd59d84 r8:00000002 r7:60000113 r6:dfd59d8c r5:849c3c00 r4:849c3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881d80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdfb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859eab8c r4:859ea800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859eab8c r4:8482e400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3c00 r8:8482e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e400 r8:8027ecf4 r7:dfd65e60 r6:8482e480 r5:849c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd59fb0 to 0xdfd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84946e40 INFO: task kworker/0:47:3293 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ab7d0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3295 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd75d84 r8:00000002 r7:60000113 r6:dfd75d8c r5:849c4800 r4:849c4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881340 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece17000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859eb78c r4:859eb400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859eb78c r4:8482e500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c4800 r8:8482e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e500 r8:8027ecf4 r7:dfd65e60 r6:8482e580 r5:849c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84812ec0 INFO: task kworker/0:48:3295 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ab97a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3298 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3298 tgid:3298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd81d84 r8:00000002 r7:60000113 r6:dfd81d8c r5:849c5400 r4:849c5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd81e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85881f40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece0f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859eb38c r4:859eb000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859eb38c r4:8482e600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:8482e62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e600 r8:8027ecf4 r7:dfd75e60 r6:8482e680 r5:849c5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd81fb0 to 0xdfd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a801c0 INFO: task kworker/0:49:3298 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: abd87000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3300 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3300 tgid:3300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd8dd84 r8:00000002 r7:60000013 r6:dfd8dd8c r5:849c6c00 r4:849c6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f1300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ebb8c r4:859eb800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ebb8c r4:8482e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6c00 r8:8482e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e700 r8:8027ecf4 r7:dfd75e60 r6:8482e780 r5:849c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a80100 INFO: task kworker/0:50:3300 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: abf70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3304 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd99d84 r8:00000002 r7:60000013 r6:dfd99d8c r5:8492a400 r4:8492a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd99e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df95f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ec38c r4:859ec000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ec38c r4:8482e880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492a400 r8:8482e8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8482e880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8482e880 r8:8027ecf4 r7:dfda5e60 r6:84966580 r5:8492a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd99fb0 to 0xdfd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a804c0 INFO: task kworker/0:52:3304 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ac0c8000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3306 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3306 tgid:3306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdc1d84 r8:00000002 r7:60000113 r6:dfdc1d8c r5:8492bc00 r4:8492bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e28c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8492bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f469000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee055000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e67b8c r4:85e67800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e67b8c r4:84966600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492bc00 r8:8496662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966600 r8:8027ecf4 r7:dfc8de60 r6:84966680 r5:8492bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc1fb0 to 0xdfdc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7d680 INFO: task kworker/1:47:3306 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ac38c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3307 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdc5d84 r8:00000002 r7:60000113 r6:dfdc5d8c r5:8492c800 r4:8492c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d0040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8492c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbe7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6838c r4:85e68000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6838c r4:84966700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492c800 r8:8496672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966700 r8:8027ecf4 r7:dfdc1e60 r6:84966780 r5:8492c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc5fb0 to 0xdfdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7d680 INFO: task kworker/1:48:3307 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ac645000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3311 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3311 tgid:3311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8492b000 r4:8492b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dfc80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8492b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e67f8c r4:85e67c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e67f8c r4:84966800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492b000 r8:8496682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966800 r8:8027ecf4 r7:dfdc1e60 r6:84966880 r5:8492b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7da80 INFO: task kworker/1:49:3311 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ac8ea000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3314 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:8492ec00 r4:8492ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d4a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8492ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f467000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee04d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6778c r4:85e67400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6778c r4:84966900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492ec00 r8:8496692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966900 r8:8027ecf4 r7:dfdc1e60 r6:84966980 r5:8492ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7dec0 INFO: task kworker/1:50:3314 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: acc24000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3316 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3316 tgid:3316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:8492d400 r4:8492d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0e40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8492d400 r7:00000000 r6:83018200 r5:00001000 r4:7f463000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee03d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e66f8c r4:85e66c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e66f8c r4:84966a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492d400 r8:84966a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966a00 r8:8027ecf4 r7:dfba1e60 r6:84966a80 r5:8492d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a82040 INFO: task kworker/1:51:3316 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: acc24000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3319 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3319 tgid:3319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:8492e000 r4:8492e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8492e000 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee045000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6738c r4:85e67000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6738c r4:84966b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492e000 r8:84966bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966b80 r8:8027ecf4 r7:dfbb1e60 r6:84966c00 r5:8492e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a822c0 INFO: task kworker/1:52:3319 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: acee3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3321 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3321 tgid:3321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84ab0c00 r4:84ab0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ab0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f45f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee029000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e66b8c r4:85e66800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e66b8c r4:84966c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab0c00 r8:84966cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966c80 r8:8027ecf4 r7:dfbb1e60 r6:84966d00 r5:84ab0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a82480 INFO: task kworker/1:53:3321 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ad4ae000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3323 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3323 tgid:3323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:84ab0000 r4:84ab0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ab0000 r7:00000000 r6:83018200 r5:00001000 r4:7f45d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee021000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6678c r4:85e66400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6678c r4:84966d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab0000 r8:84966dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966d80 r8:8027ecf4 r7:dfbd9e60 r6:84966e00 r5:84ab0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a82200 INFO: task kworker/1:54:3323 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ad754000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3325 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3325 tgid:3325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdc9d84 r8:00000002 r7:60000113 r6:dfdc9d8c r5:84ab2400 r4:84ab2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d0500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f31b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e68f8c r4:85e68c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e68f8c r4:84966e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab2400 r8:84966eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966e80 r8:8027ecf4 r7:dfbede60 r6:84966f00 r5:84ab2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc9fb0 to 0xdfdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a82840 INFO: task kworker/1:55:3325 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: adbe4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3327 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3327 tgid:3327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:84ab3000 r4:84ab3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d0600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ab3000 r7:00000000 r6:83018200 r5:00001000 r4:7f395000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed245000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e6938c r4:85e69000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e6938c r4:84966f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab3000 r8:84966fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84966f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84966f80 r8:8027ecf4 r7:dfdc9e60 r6:84a8a000 r5:84ab3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a828c0 INFO: task kworker/1:56:3327 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: adcba000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:3618 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:3618 tgid:3618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e03edd84 r8:00000002 r7:60000113 r6:e03edd8c r5:848c3c00 r4:848c3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ccc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2b8c r4:84bb2800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb2b8c r4:84bdb280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c3c00 r8:84bdb2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdb280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdb280 r8:8027ecf4 r7:e03e5e60 r6:84be3680 r5:848c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03edfb0 to 0xe03edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84b5b400 INFO: task kworker/1:177:3618 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: adecc000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:3682 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:3682 tgid:3682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0539d84 r8:00000002 r7:60000113 r6:e0539d8c r5:8498e000 r4:8498e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8498e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1f8c r4:84bb1c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1f8c r4:84bdb400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498e000 r8:84bdb42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdb400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdb400 r8:8027ecf4 r7:e03ede60 r6:84b3f400 r5:8498e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84b5ba00 INFO: task kworker/1:180:3682 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ae2f0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3780 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8709d84 r8:00000002 r7:60000113 r6:e8709d8c r5:848ba400 r4:848ba400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ba400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8709e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 INFO: task kworker/0:153:3780 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ae2f0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:3782 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e870dd84 r8:00000002 r7:60000013 r6:e870dd8c r5:848bb000 r4:848bb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e870de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bbb00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022f8c r4:85022c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022f8c r4:84a89000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bb000 r8:84a8902c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89000 r8:8027ecf4 r7:e8709e60 r6:84a89080 r5:848bb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe870dfb0 to 0xe870dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb780 INFO: task kworker/0:154:3782 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ae79b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:3784 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8711d84 r8:00000002 r7:60000113 r6:e8711d8c r5:848bbc00 r4:848bbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8711e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85040280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502c38c r4:8502c000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502c38c r4:84a89180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bbc00 r8:84a891ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89180 r8:8027ecf4 r7:e870de60 r6:84a89200 r5:848bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8711fb0 to 0xe8711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb980 INFO: task kworker/0:155:3784 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ae9d0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:3786 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:3786 tgid:3786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8719d84 r8:00000002 r7:60000013 r6:e8719d8c r5:848bd400 r4:848bd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8719e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bbb80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502338c r4:85023000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502338c r4:84a89100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bd400 r8:84a8912c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89100 r8:8027ecf4 r7:e8711e60 r6:84a89280 r5:848bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8719fb0 to 0xe8719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bbac0 INFO: task kworker/0:156:3786 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aeb79000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:3788 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e871dd84 r8:00000002 r7:60000113 r6:e871dd8c r5:848bc800 r4:848bc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e871de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bbec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0481000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502378c r4:85023400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502378c r4:84a89300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bc800 r8:84a8932c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89300 r8:8027ecf4 r7:e8711e60 r6:84a89380 r5:848bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe871dfb0 to 0xe871dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb980 INFO: task kworker/0:157:3788 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: aee73000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:3790 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8715d84 r8:00000002 r7:60000113 r6:e8715d8c r5:848bec00 r4:848bec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8715e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84957d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85023b8c r4:85023800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85023b8c r4:84a89400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bec00 r8:84a8942c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89400 r8:8027ecf4 r7:e8711e60 r6:84a89480 r5:848bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8715fb0 to 0xe8715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bbf40 INFO: task kworker/0:158:3790 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: af3ab000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:159:3793 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:159 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8729d84 r8:00000002 r7:60000013 r6:e8729d8c r5:848be000 r4:848be000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848be000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8729e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85040040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848be000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85023f8c r4:85023c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85023f8c r4:84a89500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848be000 r8:84a8952c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89500 r8:8027ecf4 r7:e8711e60 r6:84a89580 r5:848be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8729fb0 to 0xe8729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85040180 INFO: task kworker/0:159:3793 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: af5dd000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:3794 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e872dd84 r8:00000002 r7:60000113 r6:e872dd8c r5:84760000 r4:84760000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84760000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e872de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000000 r4:00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:3797 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8731d84 r8:00000002 r7:60000113 r6:e8731d8c r5:84760c00 r4:84760c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84760c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8731e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85040440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84760c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04df000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502c78c r4:8502c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502c78c r4:84a89700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dd20: af95b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 Exception stack(0xe46fdfb0 to 0xe46fdff8) Workqueue: events bpf_prog_free_deferred r5:84761800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850405c0 r4:00000001 INFO: task kworker/0:162:3798 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: afabd000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:3800 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8739d84 r8:00000002 r7:60000113 r6:e8739d8c r5:84762400 r4:84762400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84762400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8739e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85040a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84762400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46a7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502d78c r4:8502d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502d78c r4:84a89900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84762400 r8:84a8992c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89900 r8:8027ecf4 r7:e872de60 r6:84a89980 r5:84762400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8739fb0 to 0xe8739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85040540 INFO: task kworker/0:163:3800 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: afce5000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: r5:84763000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84763000 r8:84a89a2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:165 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84764800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe46fdd20 to 0xe46fdd68) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:3805 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:3805 tgid:3805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8749d84 r8:00000002 r7:60000013 r6:e8749d8c r5:84765400 r4:84765400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84765400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8749e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85040e00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84765400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8721000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502db8c r4:8502d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502db8c r4:84a89c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84765400 r8:84a89c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89c00 r8:8027ecf4 r7:e8745e60 r6:84a89c80 r5:84765400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8749fb0 to 0xe8749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85040840 INFO: task kworker/0:166:3805 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b05a5000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:3808 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:3808 tgid:3808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8741d84 r8:00000002 r7:60000113 r6:e8741d8c r5:84766000 r4:84766000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84766000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8741e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85040ec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84766000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8751000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502df8c r4:8502dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502df8c r4:84a89d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84766000 r8:84a89d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89d00 r8:8027ecf4 r7:e8745e60 r6:84a89d80 r5:84766000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8741fb0 to 0xe8741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85040d40 INFO: task kworker/0:167:3808 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b094e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753d00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:168 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8761d84 r8:00000002 r7:60000013 r6:e8761d8c r5:84766c00 r4:84766c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84766c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8761e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84766c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8769000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502e78c r4:8502e400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502e78c r4:84a89e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84766c00 r8:84a89e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: b0b4d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 r4:e46fddc0 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:3812 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e876dd84 r8:00000002 r7:60000113 r6:e876dd8c r5:84763c00 r4:84763c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84763c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e876de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84763c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8775000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502eb8c r4:8502e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502eb8c r4:84a89f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84763c00 r8:84a89f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84a89f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a89f00 r8:8027ecf4 r7:e8761e60 r6:84a89f80 r5:84763c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe876dfb0 to 0xe876dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:169:3812 is blocked on a mutex likely owned by task kworker/0:151:3776. Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b0d5a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 task:kworker/0:170 state:D stack:0 pid:3815 tgid:3815 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84850000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052580 r7:dddced40 r6:83018000 r5:8502f38c r4:85058000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8779fb0 to 0xe8779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85052100 INFO: task kworker/0:170:3815 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b0f84000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84850c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea789e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85058100 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:171:3816 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b1556000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:3818 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0529d84 r8:00000002 r7:60000013 r6:e0529d8c r5:84851800 r4:84851800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84851800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08 r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85058200 r8:8027ecf4 r7:e8779e60 r6:85058280 r5:84851800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: b1706000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:3820 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:3820 tgid:3820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:84a96000 r4:84a96000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a96000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 r5:8502fb8c r4:8502f800 r4:85058300 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:850525c0 Workqueue: events bpf_prog_free_deferred dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:3822 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0615d84 r8:00000002 r7:60000113 r6:e0615d8c r5:84a96c00 r4:84a96c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa59000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502ff8c r4:8502fc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502ff8c r4:85058380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a96c00 r8:850583ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85058380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058380 r8:8027ecf4 r7:e05e1e60 r6:84bdba80 r5:84a96c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850527c0 INFO: task kworker/0:174:3822 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3824 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea795d84 r8:00000002 r7:60000113 r6:ea795d8c r5:84a94800 r4:84a94800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a94800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea795e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850662c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a94800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85039b8c r4:85039800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85039b8c r4:85058400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a94800 r8:8505842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058400 r8:8027ecf4 r7:e0615e60 r6:84bdbb00 r5:84a94800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea795fb0 to 0xea795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85052840 INFO: task kworker/0:175:3824 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a95400 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052c00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a95400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503838c r4:85038000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503838c r4:85058480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a95400 r8:850584ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85058480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058480 r8:8027ecf4 r7:ea795e60 r6:84bdbb80 r5:84a95400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea799fb0 to 0xea799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85052b40 INFO: task kworker/0:176:3825 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:3827 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84a93c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503878c r4:85038400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503878c r4:85058500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a93c00 r8:8505852c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058500 r8:8027ecf4 r7:ea795e60 r6:84bdbc00 r5:84a93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7a1fb0 to 0xea7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85052a80 Workqueue: events bpf_prog_free_deferred dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a93000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85038b8c r4:85038800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85038b8c r4:85058580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a93000 r8:850585ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85058580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058580 r8:8027ecf4 r7:ea795e60 r6:84bdbc80 r5:84a93000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7adfb0 to 0xea7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85052bc0 INFO: task kworker/0:178:3829 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b26ff000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8501e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b9e08 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85058600 r8:8027ecf4 r7:ea795e60 r6:84bdbd00 r5:8501e000 INFO: task kworker/0:179:3832 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b2d8f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84a98c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a98c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7c1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aa400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503938c r4:85039000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503938c r4:85058680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a98c00 r8:850586ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85058680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058680 r8:8027ecf4 r7:ea795e60 r6:84bdbd80 r5:84a98c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7c1fb0 to 0xea7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b2d8f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a9a400 r5:84a9a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85058700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058700 r8:8027ecf4 r7:ea795e60 r6:84bdbe00 r5:84a9a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7c9fb0 to 0xea7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066000 INFO: task kworker/0:181:3836 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b3339000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:3838 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7d1d84 r8:00000002 r7:60000113 r6:ea7d1d8c r5:84a98000 r4:84a98000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a98000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7d1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066a00 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a98000 r8:850587ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05f5d84 r8:00000002 r7:60000113 r6:e05f5d8c r5:84853c00 r4:84853c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84853c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff01000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85039f8c r4:85039c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85039f8c r4:85058800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853c00 r8:8505882c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058800 r8:8027ecf4 r7:ea7d1e60 r6:85058880 r5:84853c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f5fb0 to 0xe05f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066340 INFO: task kworker/0:183:3839 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b38d4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:3842 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7cdd84 r8:00000002 r7:60000113 r6:ea7cdd8c r5:84854800 r4:84854800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84854800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84854800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503a38c r4:8503a000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503a38c r4:85058900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84854800 r8:8505892c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058900 r8:8027ecf4 r7:ea7d1e60 r6:85058980 r5:84854800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7cdfb0 to 0xea7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066540 INFO: task kworker/0:184:3842 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b3c50000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:3843 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7d5d84 r8:00000002 r7:60000113 r6:ea7d5d8c r5:84855400 r4:84855400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84855400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7d5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84855400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503a78c r4:8503a400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503a78c r4:85058a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84855400 r8:85058a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058a00 r8:8027ecf4 r7:ea7d1e60 r6:85058a80 r5:84855400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7d5fb0 to 0xea7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066540 INFO: task kworker/0:185:3843 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b40d1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:3846 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7ddd84 r8:00000002 r7:60000013 r6:ea7ddd8c r5:84856000 r4:84856000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84856000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850668c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84856000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503ab8c r4:8503a800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503ab8c r4:85058b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:85058b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058b00 r8:8027ecf4 r7:ea7d1e60 r6:85058b80 r5:84856000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7ddfb0 to 0xea7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850665c0 INFO: task kworker/0:186:3846 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b479a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:3848 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7e1d84 r8:00000002 r7:60000113 r6:ea7e1d8c r5:84856c00 r4:84856c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84856c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066ec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84856c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0379000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503bb8c r4:8503b800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503bb8c r4:85058c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856c00 r8:85058c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058c00 r8:8027ecf4 r7:ea7d1e60 r6:85058c80 r5:84856c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7e1fb0 to 0xea7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066880 INFO: task kworker/0:187:3848 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b4c5f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:3849 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:3849 tgid:3849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8755d84 r8:00000002 r7:60000113 r6:e8755d8c r5:84853000 r4:84853000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84853000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8755e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e033d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503b38c r4:8503b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503b38c r4:85058d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853000 r8:85058d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058d00 r8:8027ecf4 r7:ea7e1e60 r6:85058d80 r5:84853000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8755fb0 to 0xe8755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066880 INFO: task kworker/0:188:3849 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b4fa2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3851 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7e5d84 r8:00000002 r7:60000113 r6:ea7e5d8c r5:84852400 r4:84852400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84852400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85066d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84852400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0357000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503b78c r4:8503b400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8503b78c r4:85058e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84852400 r8:85058e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058e00 r8:8027ecf4 r7:ea7e1e60 r6:85058e80 r5:84852400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7e5fb0 to 0xea7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066c40 INFO: task kworker/0:189:3851 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b4fa2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3854 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3854 tgid:3854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7e9d84 r8:00000002 r7:60000113 r6:ea7e9d8c r5:849a0000 r4:849a0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7e9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e878c r4:850e8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e878c r4:85058f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0000 r8:85058f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85058f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85058f00 r8:8027ecf4 r7:ea7e1e60 r6:85058f80 r5:849a0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7e9fb0 to 0xea7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85066d40 INFO: task kworker/0:190:3854 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b525c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:191 state:D stack:0 pid:3856 tgid:3856 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849a1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8503bf8c r4:8507f000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:192:3857 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7f5d84 r8:00000002 r7:60000113 r6:ea7f5d8c r5:849a2400 r4:849a2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d0c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0575000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e838c r4:850e8000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e838c r4:8507f100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a2400 r8:8507f12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f100 r8:8027ecf4 r7:ea7e9e60 r6:8507f180 r5:849a2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7f5fb0 to 0xea7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507d000 INFO: task kworker/0:192:3857 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b5bbf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:849a3c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d580 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849a3c00 r8:8507f22c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:193:3860 is blocked on a mutex likely owned by task kworker/0:151:3776. r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3862 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7edd84 r8:00000002 r7:60000013 r6:ea7edd8c r5:849a5400 r4:849a5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e938c r4:8507f300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a5400 r8:8507f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f300 r8:8027ecf4 r7:ea7f9e60 r6:8507f380 r5:849a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7edfb0 to 0xea7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507d400 INFO: task kworker/0:194:3862 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b63fd000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 r5:80000013 r4:80239bb0 r4:e46fddc0 r5:00001000 r4:e042b000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:849a6000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea801e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e8f8c r4:850e8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e8f8c r4:8507f400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a6000 r8:8507f42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f400 r8:8027ecf4 r7:ea7ede60 r6:8507f480 r5:849a6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 r5:00001000 r4:e0605000 9fa0: 00000000 00000000 00000000 00000000 r4:e46fddc0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea80dd84 r8:00000002 r7:60000113 r6:ea80dd8c r5:849a6c00 r4:849a6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea80de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ea78c r4:850ea400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ea78c r4:8507f600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a6c00 r8:8507f62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f600 r8:8027ecf4 r7:ea809e60 r6:8507f680 r5:849a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea80dfb0 to 0xea80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507d840 INFO: task kworker/0:197:3869 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b738e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 r5:8502278c r4:85022400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849a0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea811e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e9b8c r4:850e9800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e9b8c r4:8507f700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0c00 r8:8507f72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f700 r8:8027ecf4 r7:ea80de60 r6:8507f780 r5:849a0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea811fb0 to 0xea811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507d840 INFO: task kworker/0:198:3870 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b74a1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:3874 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea819d84 r8:00000002 r7:60000013 r6:ea819d8c r5:849a9800 r5:849a9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea819e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e9f8c r4:850e9c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e9f8c r4:8507f800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a9800 r8:8507f82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f800 r8:8027ecf4 r7:ea80de60 r6:8507f880 r5:849a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea819fb0 to 0xea819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507df80 INFO: task kworker/0:199:3874 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:200 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849a8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ea38c r4:850ea000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ea38c r4:8507f900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a8c00 r8:8507f92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f900 r8:8027ecf4 r7:ea80de60 r6:8507f980 r5:849a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea81dfb0 to 0xea81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507d540 INFO: task kworker/0:200:3875 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b7884000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 INFO: task kworker/1:181:3876 blocked for more than 456 seconds. r5:849ab000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:849ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb7b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb278c r4:84bb2400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb278c r4:84bdbf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ab000 r8:84bdbf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdbf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdbf00 r8:8027ecf4 r7:e03ede60 r6:8507fa00 r5:849ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea825fb0 to 0xea825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85062b40 INFO: task kworker/1:181:3876 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:80000013 r4:80239bb0 r4:e46fddc0 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:201 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849aa400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea82d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eab8c r4:850ea800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850eab8c r4:8507fa80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849aa400 r8:8507faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507fa80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507fa80 r8:8027ecf4 r7:ea80de60 r6:8507fb00 r5:849aa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea829fb0 to 0xea829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507e100 INFO: task kworker/0:201:3879 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:849abc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea821e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e9c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea83d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:e46fddc0 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:844bb340 r5:849ac800 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:3886 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:3886 tgid:3886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea841d84 r8:00000002 r7:60000113 r6:ea841d8c r5:849ad400 r4:849ad400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849ad400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea841e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507eb80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:849ad400 r8:8507fdac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:844bb340 Workqueue: events bpf_prog_free_deferred r5:84a9c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ecc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea859000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ebb8c r4:850eb800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ebb8c r4:8507fe80 r4:00000001 r4:8507ea00 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b8994000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8502278c r4:85022400 r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:206 state:D stack:0 pid:3890 tgid:3890 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a9e000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xea881fb0 to 0xea881ff8) task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b8994000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a9ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:850ebf8c r4:850ebc00 r4:8507ff80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:3894 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea899d84 r8:00000002 r7:60000113 r6:ea899d8c r5:84a9b000 r4:84a9b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea899e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ef80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea87d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f438c r4:850f4000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f438c r4:84bdbf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9b000 r8:84bdbfac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdbf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdbf80 r8:8027ecf4 r7:ea881e60 r6:85080600 r5:84a9b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea899fb0 to 0xea899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507ec80 INFO: task kworker/0:208:3894 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b8e5a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:3896 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8a9d84 r8:00000002 r7:60000113 r6:ea8a9d8c r5:84a99800 r4:84a99800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a99800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a99800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8cb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f538c r4:850f5000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f538c r4:8508d000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a99800 r8:8508d02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d000 r8:8027ecf4 r7:ea881e60 r6:85080680 r5:84a99800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a9fb0 to 0xea8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85062400 INFO: task kworker/0:209:3896 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b926d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:3897 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8b9d84 r8:00000002 r7:60000013 r6:ea8b9d8c r5:84a9d400 r4:84a9d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507d840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ab000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f4b8c r4:850f4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f4b8c r4:8508d080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9d400 r8:8508d0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d080 r8:8027ecf4 r7:ea8a9e60 r6:85080700 r5:84a9d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b9fb0 to 0xea8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507dd80 INFO: task kworker/0:210:3897 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b962b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3899 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8bdd84 r8:00000002 r7:60000113 r6:ea8bdd8c r5:84a9bc00 r4:84a9bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8bde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505fec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f4f8c r4:850f4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f4f8c r4:8508d100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:8508d12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d100 r8:8027ecf4 r7:ea8a9e60 r6:85080780 r5:84a9bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8bdfb0 to 0xea8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507dd80 INFO: task kworker/0:211:3899 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b9693000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:3906 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e46c9d84 r8:00000002 r7:60000113 r6:e46c9d8c r5:84a92400 r4:84a92400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a92400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46c9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c140 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc35000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb338c r4:84bb3000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb338c r4:85080800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a92400 r8:8508082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080800 r8:8027ecf4 r7:e03ede60 r6:85080880 r5:84a92400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46c9fb0 to 0xe46c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508cac0 INFO: task kworker/1:182:3906 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: b9b8f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:3907 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e46d9d84 r8:00000002 r7:60000013 r6:e46d9d8c r5:84b80000 r4:84b80000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b80000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46d9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cfc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc01000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2f8c r4:84bb2c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb2f8c r4:85080900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b80000 r8:8508092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080900 r8:8027ecf4 r7:e46c9e60 r6:85080980 r5:84b80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46d9fb0 to 0xe46d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508cac0 INFO: task kworker/1:183:3907 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ba1a6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:3909 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e46e9d84 r8:00000002 r7:60000113 r6:e46e9d8c r5:84b81800 r4:84b81800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b81800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46e9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b81800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df953000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f578c r4:850f5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f578c r4:8508d180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b81800 r8:8508d1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d180 r8:8027ecf4 r7:ea8a9e60 r6:85080a00 r5:84b81800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46e9fb0 to 0xe46e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508e1c0 INFO: task kworker/0:212:3909 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ba1a6000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:213:3910 blocked for more than 457 seconds. [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84b82400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505f800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b82400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea975000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f5f8c r4:850f5c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f5f8c r4:8508d200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b82400 r8:8508d22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d200 r8:8027ecf4 r7:e46e9e60 r6:85080a80 r5:84b82400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d5fb0 to 0xea8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508e1c0 INFO: task kworker/0:213:3910 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ba7f1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:214 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b83000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505f6c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b83000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea969000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f5b8c r4:850f5800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f5b8c r4:8508d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b83000 r8:8508d2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d280 r8:8027ecf4 r7:ea8d5e60 r6:85080b80 r5:84b83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d9fb0 to 0xea8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508e1c0 INFO: task kworker/0:214:3911 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bae7d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:3912 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b83c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0443000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc478c r4:84bc4400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc478c r4:85080b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b83c00 r8:85080b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080b00 r8:8027ecf4 r7:e46c9e60 r6:85080c00 r5:84b83c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8ddfb0 to 0xea8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508c440 INFO: task kworker/1:184:3912 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bb0d7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:185 state:D stack:0 pid:3915 tgid:3915 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b84800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b84800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc71000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb378c r4:84bb3400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb378c r4:85080c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b84800 r8:85080cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080c80 r8:8027ecf4 r7:ea8dde60 r6:85080d00 r5:84b84800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b5fb0 to 0xea8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85097280 INFO: task kworker/1:185:3915 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bb56f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r4:e46fddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:186 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849ae000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe23000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3b8c r4:84bb3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb3b8c r4:85080d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ae000 r8:85080dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080d80 r8:8027ecf4 r7:ea8dde60 r6:8508d300 r5:849ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e1fb0 to 0xea8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850971c0 INFO: task kworker/1:186:3916 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bb97c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:849a3000 r5:849a3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe63000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3f8c r4:84bb3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb3f8c r4:85080e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3000 r8:85080e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080e00 r8:8027ecf4 r7:ea8dde60 r6:8508d380 r5:849a3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8edfb0 to 0xea8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85097100 INFO: task kworker/1:187:3919 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84758000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850975c0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85080e80 Exception stack(0xea8f1fb0 to 0xea8f1ff8) r4:85097200 Workqueue: events bpf_prog_free_deferred Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bc318000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:3922 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7fdd84 r8:00000002 r7:60000013 r6:ea7fdd8c r5:84b85400 r4:84b85400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b85400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097700 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85080f00 Exception stack(0xea7fdfb0 to 0xea7fdff8) INFO: task kworker/1:189:3922 is blocked on a mutex likely owned by task kworker/0:151:3776. dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3925 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8f5d84 r8:00000002 r7:60000013 r6:ea8f5d8c r5:84b86000 r4:84b86000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b86000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b86000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0408000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847b8b8c r4:847b8800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85080000 r8:8027ecf4 r7:ea8dde60 r6:85080080 r5:84b86000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80000013 ffffffff r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:3926 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8fdd84 r8:00000002 r7:60000013 r6:ea8fdd8c r5:84b86c00 r4:84b86c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b86c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0416000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847bab8c r4:847ba800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847bab8c r4:85080100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b86c00 r8:8508012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080100 r8:8027ecf4 r7:ea8dde60 r6:85080180 r5:84b86c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8fdfb0 to 0xea8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850976c0 INFO: task kworker/1:191:3926 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bd080000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:3929 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea901d84 r8:00000002 r7:60000013 r6:ea901d8c r5:84b80c00 r4:84b80c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b80c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea901e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc438c r4:84bc4000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc438c r4:85080200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b80c00 r8:8508022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080200 r8:8027ecf4 r7:ea8dde60 r6:85080280 r5:84b80c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea901fb0 to 0xea901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85097800 INFO: task kworker/1:192:3929 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bd080000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:3931 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea905d84 r8:00000002 r7:60000113 r6:ea905d8c r5:84792400 r4:84792400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84792400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097e40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84792400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc4b8c r4:84bc4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc4b8c r4:85080300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84792400 r8:8508032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080300 r8:8027ecf4 r7:ea8dde60 r6:85080380 r5:84792400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea905fb0 to 0xea905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85097a00 INFO: task kworker/1:193:3931 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bd6db000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:3933 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:84aa6c00 r4:84aa6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc4f8c r4:84bc4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc4f8c r4:85080400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa6c00 r8:8508042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85080400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080400 r8:8027ecf4 r7:ea905e60 r6:85082000 r5:84aa6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85097cc0 INFO: task kworker/1:194:3933 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: be01a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:3935 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea90dd84 r8:00000002 r7:60000013 r6:ea90dd8c r5:84b88000 r4:84b88000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b88000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea90de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508cc00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc538c r4:84bc5000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc538c r4:85082080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88000 r8:850820ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082080 r8:8027ecf4 r7:ea909e60 r6:85082100 r5:84b88000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea90dfb0 to 0xea90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85097e00 INFO: task kworker/1:195:3935 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: be01a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:3936 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea851d84 r8:00000002 r7:60000013 r6:ea851d8c r5:84b88c00 r4:84b88c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b88c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea851e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077180 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc578c r4:84bc5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc578c r4:85082180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88c00 r8:850821ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082180 r8:8027ecf4 r7:ea90de60 r6:85082200 r5:84b88c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea851fb0 to 0xea851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508c640 INFO: task kworker/1:196:3936 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: be67f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:3939 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea919d84 r8:00000002 r7:60000113 r6:ea919d8c r5:84b89800 r4:84b89800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b89800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc5b8c r4:84bc5800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc5b8c r4:85082280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b89800 r8:850822ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082280 r8:8027ecf4 r7:ea851e60 r6:85082300 r5:84b89800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850771c0 INFO: task kworker/1:197:3939 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: be7c0000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:3941 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea921d84 r8:00000002 r7:60000113 r6:ea921d8c r5:84b8a400 r4:84b8a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea921e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc5f8c r4:84bc5c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc5f8c r4:85082380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8a400 r8:850823ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082380 r8:8027ecf4 r7:ea919e60 r6:85082400 r5:84b8a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea921fb0 to 0xea921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85077300 INFO: task kworker/1:198:3941 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: bed46000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:3943 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:3943 tgid:3943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea925d84 r8:00000002 r7:60000113 r6:ea925d8c r5:84b8b000 r4:84b8b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0505000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc638c r4:84bc6000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc638c r4:85082480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8b000 r8:850824ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082480 r8:8027ecf4 r7:ea921e60 r6:85082500 r5:84b8b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea925fb0 to 0xea925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85077500 INFO: task kworker/1:199:3943 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:3945 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:3945 tgid:3945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea929d84 r8:00000002 r7:60000013 r6:ea929d8c r5:84b8bc00 r4:84b8bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea929e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46dd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84bc6b8c r4:85082580 Exception stack(0xea929fb0 to 0xea929ff8) task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:3946 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r5:8475a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84758c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84bd178c r4:84bd1400 r10:00000000 r9:85082700 r8:8027ecf4 r7:ea929e60 r6:8508d500 r5:84758c00 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:3950 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:3950 tgid:3950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea941d84 r8:00000002 r7:60000113 r6:ea941d8c r5:8475bc00 r4:8475bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:3953 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8475b000 r5:8475b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:3955 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea955d84 r8:00000002 r7:60000113 r6:ea955d8c r5:84759800 r4:84759800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84759800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84759800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8765000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc778c r4:84bc7400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea955fb0 to 0xea955ff8) task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:206 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:8475c800 r4:8475c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8773000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc7b8c r4:84bc7800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc7b8c r4:85082900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475c800 r8:8508292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082900 r8:8027ecf4 r7:ea93de60 r6:8508d700 r5:8475c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85077c40 INFO: task kworker/1:206:3957 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c042b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3958 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea95dd84 r8:00000002 r7:60000013 r6:ea95dd8c r5:8475e000 r4:8475e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077fc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea78b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc7f8c r4:84bc7c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bc7f8c r4:85082980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475e000 r8:850829ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082980 r8:8027ecf4 r7:ea93de60 r6:8508d780 r5:8475e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85077c40 INFO: task kworker/1:207:3958 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c0a0e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3960 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea96dd84 r8:00000002 r7:60000013 r6:ea96dd8c r5:8475d400 r4:8475d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea96de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ed80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8475d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea911000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd038c r4:84bd0000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd038c r4:85082a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475d400 r8:85082a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082a00 r8:8027ecf4 r7:ea93de60 r6:8508d800 r5:8475d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea96dfb0 to 0xea96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508efc0 INFO: task kworker/1:208:3960 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c0f46000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:3962 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea961d84 r8:00000002 r7:60000113 r6:ea961d8c r5:84b8e000 r4:84b8e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea961e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e140 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd078c r4:84bd0400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd078c r4:85082a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8e000 r8:85082aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082a80 r8:8027ecf4 r7:ea93de60 r6:85082b00 r5:84b8e000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:209:3962 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c13d5000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:3965 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea985d84 r8:00000002 r7:60000113 r6:ea985d8c r5:84b8c800 r4:84b8c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505f900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f638c r4:850f6000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f638c r4:8508d880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8c800 r8:8508d8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d880 r8:8027ecf4 r7:ea8d5e60 r6:85082b80 r5:84b8c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505f680 INFO: task kworker/0:215:3965 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c178b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:3968 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84b8ec00 r5:84b8ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd0b8c r4:84bd0800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd0b8c r4:85082c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8ec00 r8:85082c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082c00 r8:8027ecf4 r7:ea93de60 r6:85082c80 r5:84b8ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505e080 INFO: task kworker/1:210:3968 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c1d70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3969 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84b90c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea995000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd0f8c r4:84bd0c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd0f8c r4:85082d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b90c00 r8:85082d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082d00 r8:8027ecf4 r7:ea93de60 r6:85082d80 r5:84b90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505e440 INFO: task kworker/1:211:3969 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c1d70000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3972 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3972 tgid:3972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:84b92400 r4:84b92400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b92400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505e700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b92400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd138c r4:84bd1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd138c r4:85082e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b92400 r8:85082e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082e00 r8:8027ecf4 r7:ea93de60 r6:85082e80 r5:84b92400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505e440 INFO: task kworker/1:212:3972 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:3973 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9b5d84 r8:00000002 r7:60000013 r6:ea9b5d8c r5:84b90000 r4:84b90000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b90000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ef80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd278c r4:84bd2400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd278c r4:85082f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b90000 r8:85082f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85082f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3974 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3974 tgid:3974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:8475ec00 r4:8475ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8475ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505f080 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8475ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa65000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f6b8c r4:850f6800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f6b8c r4:8508d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8475ec00 r8:8508d92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8508d900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508d900 r8:8027ecf4 r7:ea985e60 r6:8508d980 r5:8475ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505f700 INFO: task kworker/0:216:3974 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c2a9c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3976 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea91dd84 r8:00000002 r7:60000113 r6:ea91dd8c r5:849aec00 r4:849aec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849aec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ffc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfa0f000 r10:61c88647 r9:849aec00 r8:8508da2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:849a8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ec40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd1b8c r4:84bd1800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd1b8c r4:85060000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a8000 r8:8506002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060000 r8:8027ecf4 r7:ea9b5e60 r6:8508db00 r5:849a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505e940 INFO: task kworker/1:214:3979 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c36db000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:84753d00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:848a0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ed40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd1f8c r4:84bd1c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd1f8c r4:85060080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0000 r8:850600ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060080 r8:8027ecf4 r7:ea9b5e60 r6:8508db80 r5:848a0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505ec80 INFO: task kworker/1:215:3981 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c36db000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:3983 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9edd84 r8:00000002 r7:60000013 r6:ea9edd8c r5:848a0c00 r4:848a0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ee40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd238c r4:84bd2000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd238c r4:85060100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0c00 r8:8506012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060100 r8:8027ecf4 r7:ea9b5e60 r6:8508dc00 r5:848a0c00 dfa0: 00000000 00000000 00000000 00000000 r4:8505ec80 INFO: task kworker/1:216:3983 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c3e47000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:3984 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3984 tgid:3984 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848a1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068180 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa01000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd2f8c r4:84bd2c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd2f8c r4:85060180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a1800 r8:850601ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060180 r8:8027ecf4 r7:ea9b5e60 r6:8508dc80 r5:848a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f9fb0 to 0xea9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505ed80 INFO: task kworker/1:217:3984 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c4222000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:3986 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa05d84 r8:00000002 r7:60000013 r6:eaa05d8c r5:848a2400 r4:848a2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85077ec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd2b8c r4:84bd2800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd2b8c r4:85060200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a2400 r8:8506022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060200 r8:8027ecf4 r7:ea9f9e60 r6:8508dd00 r5:848a2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa05fb0 to 0xeaa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505efc0 INFO: task kworker/1:218:3986 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c4504000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3992 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:848a3000 r4:848a3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb1000 r5:850f738c r4:850f7000 r10:61c88647 r9:848a3000 r8:8508ddac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3993 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3993 tgid:3993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea7b1d84 r8:00000002 r7:60000113 r6:ea7b1d8c r5:848a3c00 r4:848a3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ee40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8508de80 r8:8027ecf4 r7:ea9c1e60 r6:8508df00 r5:848a3c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:3995 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:848a4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea85de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0319000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd3f8c r4:84bd3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd3f8c r4:85060280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a4800 r8:850602ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060280 r8:8027ecf4 r7:ea9f9e60 r6:8508df80 r5:848a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea85dfb0 to 0xea85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85068480 INFO: task kworker/1:219:3995 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) r4:82ac21e4 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe46fdfb0 to 0xe46fdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:3996 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea889d84 r8:00000002 r7:60000113 r6:ea889d8c r5:848a5400 r4:848a5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea889e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac0c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc13000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd378c r4:84bd3400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd378c r4:85060300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a5400 r8:8506032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060300 r8:8027ecf4 r7:ea85de60 r6:8506b000 r5:848a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea889fb0 to 0xea889ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:85068480 Workqueue: events bpf_prog_free_deferred Exception stack(0xe46fdd20 to 0xe46fdd68) r4:e46fddc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:3998 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea895d84 r8:00000002 r7:60000113 r6:ea895d8c r5:848a6c00 r4:848a6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea895e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd15000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f778c r4:850f7400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f778c r4:8506b080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a6c00 r8:8506b0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b080 r8:8027ecf4 r7:ea9c1e60 r6:8506b100 r5:848a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea895fb0 to 0xea895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069200 INFO: task kworker/0:220:3998 is blocked on a mutex likely owned by task kworker/0:151:3776. r4:00000000 r5:80000013 r4:80239bb0 r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4000 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4000 tgid:4000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8a1d84 r8:00000002 r7:60000013 r6:ea8a1d8c r5:844a0c00 r4:844a0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f7b8c r4:850f7800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f7b8c r4:8506b180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a0c00 r8:8506b1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069380 INFO: task kworker/0:221:4000 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c57d4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) INFO: task kworker/0:222:4002 blocked for more than 458 seconds. r5:844a2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:844a2400 r8:8506b2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b280 r8:8027ecf4 r7:ea8a1e60 r6:8506b300 r5:844a2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b1fb0 to 0xea8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069580 INFO: task kworker/0:222:4002 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c5b1b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r5:8502278c r4:85022400 r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) r4:844bb340 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84b94800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850f7f8c r4:850f7c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850f7f8c r4:8506b380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b94800 r8:8506b3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b380 r8:8027ecf4 r7:ea8b1e60 r6:85060380 r5:84b94800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8c5fb0 to 0xea8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850691c0 INFO: task kworker/0:223:4003 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c5da1000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:844bb340 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:ea8d1d84 r8:00000002 r7:60000113 r6:ea8d1d8c r5:84b93000 r5:84b93000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b93000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff69000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510478c r4:85104400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510478c r4:8506b400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93000 r8:8506b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b400 r8:8027ecf4 r7:ea8b1e60 r6:85060400 r5:84b93000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d1fb0 to 0xea8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069840 INFO: task kworker/0:224:4005 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c5f35000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4008 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4008 tgid:4008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa11d84 r8:00000002 r7:60000013 r6:eaa11d8c r5:84b96000 r4:84b96000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b96000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b96000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85104b8c r4:85104800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85104b8c r4:8506b480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b96000 r8:8506b4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b480 r8:8027ecf4 r7:ea8d1e60 r6:85060480 r5:84b96000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069a00 INFO: task kworker/0:225:4008 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c60c8000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:4010 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa19d84 r8:00000002 r7:60000013 r6:eaa19d8c r5:84b95400 r4:84b95400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b95400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b95400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0377000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510578c r4:85105400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510578c r4:8506b500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b95400 r8:8506b52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b500 r8:8027ecf4 r7:eaa11e60 r6:85060500 r5:84b95400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa19fb0 to 0xeaa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069b40 INFO: task kworker/0:226:4010 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c6494000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:4012 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa21d84 r8:00000002 r7:60000013 r6:eaa21d8c r5:84b91800 r4:84b91800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b91800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b91800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e031d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85104f8c r4:85104c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85104f8c r4:8506b580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b91800 r8:8506b5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b580 r8:8027ecf4 r7:eaa19e60 r6:85060580 r5:84b91800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069bc0 INFO: task kworker/0:227:4012 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c673a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:4013 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea88dd84 r8:00000002 r7:60000113 r6:ea88dd8c r5:844a0000 r4:844a0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea88de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069f00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e034f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510538c r4:85105000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510538c r4:8506b600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a0000 r8:8506b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b600 r8:8027ecf4 r7:eaa19e60 r6:8506b680 r5:844a0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea88dfb0 to 0xea88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85069bc0 INFO: task kworker/0:228:4013 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c6968000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:4016 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa1dd84 r8:00000002 r7:60000013 r6:eaa1dd8c r5:844a3000 r4:844a3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85105b8c r4:85105800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85105b8c r4:8506b700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a3000 r8:8506b72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b700 r8:8027ecf4 r7:eaa19e60 r6:8506b780 r5:844a3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073080 INFO: task kworker/0:229:4016 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c6d59000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:4018 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:844a3c00 r4:844a3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850738c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85106b8c r4:85106800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85106b8c r4:8506b800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a3c00 r8:8506b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b800 r8:8027ecf4 r7:eaa1de60 r6:8506b880 r5:844a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073240 INFO: task kworker/0:230:4018 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c6e80000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:4019 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:4019 tgid:4019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa0dd84 r8:00000002 r7:60000113 r6:eaa0dd8c r5:844a4800 r4:844a4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85105f8c r4:85105c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85105f8c r4:8506b900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a4800 r8:8506b92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506b900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506b900 r8:8027ecf4 r7:eaa25e60 r6:8506b980 r5:844a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa0dfb0 to 0xeaa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073240 INFO: task kworker/0:231:4019 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c71ab000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4021 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa31d84 r8:00000002 r7:60000113 r6:eaa31d8c r5:844a6c00 r4:844a6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0593000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510638c r4:85106000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510638c r4:8506ba00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a6c00 r8:8506ba2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506ba00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ba00 r8:8027ecf4 r7:eaa25e60 r6:8506ba80 r5:844a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073500 INFO: task kworker/0:232:4021 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c739f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:4024 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa2dd84 r8:00000002 r7:60000113 r6:eaa2dd8c r5:844a5400 r4:844a5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510678c r4:85106400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510678c r4:8506bb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a5400 r8:8506bb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506bb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506bb00 r8:8027ecf4 r7:eaa25e60 r6:8506bb80 r5:844a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073640 INFO: task kworker/0:233:4024 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c754e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:4026 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:844a6000 r4:844a6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05eb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85106f8c r4:85106c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85106f8c r4:8506bc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a6000 r8:8506bc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506bc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506bc00 r8:8027ecf4 r7:eaa25e60 r6:8506bc80 r5:844a6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073880 INFO: task kworker/0:234:4026 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c76bd000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:4029 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa39d84 r8:00000002 r7:60000113 r6:eaa39d8c r5:844a1800 r4:844a1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85107b8c r4:85107800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85107b8c r4:8506bd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a1800 r8:8506bd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506bd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506bd00 r8:8027ecf4 r7:eaa35e60 r6:8506bd80 r5:844a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850737c0 INFO: task kworker/0:235:4029 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c79d9000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:4030 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:848a6000 r4:848a6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0617000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510738c r4:85107000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510738c r4:8506be00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a6000 r8:8506be2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506be00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506be00 r8:8027ecf4 r7:eaa39e60 r6:8506be80 r5:848a6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850737c0 INFO: task kworker/0:236:4030 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c79d9000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4033 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa41d84 r8:00000002 r7:60000013 r6:eaa41d8c r5:84990000 r4:84990000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84990000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85073d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84990000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0637000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510778c r4:85107400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510778c r4:8506bf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990000 r8:8506bf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506bf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506bf00 r8:8027ecf4 r7:eaa39e60 r6:8506bf80 r5:84990000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073dc0 INFO: task kworker/0:237:4033 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c7b87000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:4034 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa45d84 r8:00000002 r7:60000013 r6:eaa45d8c r5:84990c00 r4:84990c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84990c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069f40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84990c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85107f8c r4:85107c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85107f8c r4:85094000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990c00 r8:8509402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094000 r8:8027ecf4 r7:eaa39e60 r6:85094080 r5:84990c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073d00 INFO: task kworker/0:238:4034 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c7fe5000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:4036 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa49d84 r8:00000002 r7:60000113 r6:eaa49d8c r5:84991800 r4:84991800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84991800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84991800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510c38c r4:8510c000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510c38c r4:85094100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84991800 r8:8509412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094100 r8:8027ecf4 r7:eaa45e60 r6:85094180 r5:84991800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa49fb0 to 0xeaa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85073ec0 INFO: task kworker/0:239:4036 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c828a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:4038 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa4dd84 r8:00000002 r7:60000013 r6:eaa4dd8c r5:84992400 r4:84992400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84992400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84992400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea79d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510c78c r4:8510c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510c78c r4:85094200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84992400 r8:8509422c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094200 r8:8027ecf4 r7:eaa49e60 r6:85094280 r5:84992400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa4dfb0 to 0xeaa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090080 INFO: task kworker/0:240:4038 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c8676000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4040 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa51d84 r8:00000002 r7:60000113 r6:eaa51d8c r5:84993000 r4:84993000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84993000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84993000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7b5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510cb8c r4:8510c800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510cb8c r4:85094300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84993000 r8:8509432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094300 r8:8027ecf4 r7:eaa4de60 r6:85094380 r5:84993000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa51fb0 to 0xeaa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090180 INFO: task kworker/0:241:4040 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c88d2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4043 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4043 tgid:4043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:84993c00 r4:84993c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84993c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84993c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea815000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510d38c r4:8510d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510d38c r4:85094400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84993c00 r8:8509442c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094400 r8:8027ecf4 r7:eaa51e60 r6:85094480 r5:84993c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090280 INFO: task kworker/0:242:4043 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c899a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:4044 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:84994800 r4:84994800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84994800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850905c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84994800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510cf8c r4:8510cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510cf8c r4:85094500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84994800 r8:8509452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094500 r8:8027ecf4 r7:eaa55e60 r6:85094580 r5:84994800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090440 INFO: task kworker/0:243:4044 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c8fca000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4047 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:84995400 r4:84995400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84995400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850908c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84995400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea833000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510d78c r4:8510d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510d78c r4:85094600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84995400 r8:8509462c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094600 r8:8027ecf4 r7:eaa55e60 r6:85094680 r5:84995400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa5dfb0 to 0xeaa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090600 INFO: task kworker/0:244:4047 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c93cf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:4048 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:84996000 r4:84996000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84996000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84996000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea847000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510db8c r4:8510d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510db8c r4:85094700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84996000 r8:8509472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094700 r8:8027ecf4 r7:eaa5de60 r6:85094780 r5:84996000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090740 INFO: task kworker/0:245:4048 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c9655000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4050 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4050 tgid:4050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:84996c00 r4:84996c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84996c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84996c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea85f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510df8c r4:8510dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510df8c r4:85094800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84996c00 r8:8509482c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094800 r8:8027ecf4 r7:eaa61e60 r6:85094880 r5:84996c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090900 INFO: task kworker/0:246:4050 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c9949000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4053 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:84860c00 r4:84860c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84860c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea871000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510e38c r4:8510e000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510e38c r4:85094900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:8509492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094900 r8:8027ecf4 r7:eaa65e60 r6:85094980 r5:84860c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090a40 INFO: task kworker/0:247:4053 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c9cae000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4054 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa71d84 r8:00000002 r7:60000113 r6:eaa71d8c r5:84861800 r4:84861800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84861800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505efc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84861800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea88f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510e78c r4:8510e400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510e78c r4:85094a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84861800 r8:85094a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094a00 r8:8027ecf4 r7:eaa6de60 r6:85094a80 r5:84861800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa71fb0 to 0xeaa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090b40 INFO: task kworker/0:248:4054 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: c9e9d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:4056 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa69d84 r8:00000002 r7:60000113 r6:eaa69d8c r5:84863000 r4:84863000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84863000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84863000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ad000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510eb8c r4:8510e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510eb8c r4:85094b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863000 r8:85094b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094b00 r8:8027ecf4 r7:eaa71e60 r6:85094b80 r5:84863000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7000 INFO: task kworker/0:249:4056 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ca3f4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:4058 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa79d84 r8:00000002 r7:60000013 r6:eaa79d8c r5:84862400 r4:84862400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84862400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df961000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510ef8c r4:8510ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510ef8c r4:85094c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84862400 r8:85094c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094c00 r8:8027ecf4 r7:eaa69e60 r6:85094c80 r5:84862400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7000 INFO: task kworker/0:250:4058 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ca80f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:4060 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea8e5d84 r8:00000002 r7:60000013 r6:ea8e5d8c r5:84864800 r4:84864800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84864800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a79c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84864800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510f78c r4:8510f400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510f78c r4:85094d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84864800 r8:85094d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094d00 r8:8027ecf4 r7:eaa79e60 r6:85094d80 r5:84864800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7380 INFO: task kworker/0:251:4060 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cad20000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4062 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa7dd84 r8:00000002 r7:60000013 r6:eaa7dd8c r5:84860000 r4:84860000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84860000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a77c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb71000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510f38c r4:8510f000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510f38c r4:85094e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860000 r8:85094e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094e00 r8:8027ecf4 r7:ea8e5e60 r6:85094e80 r5:84860000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7640 INFO: task kworker/0:252:4062 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cb0cc000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4065 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:84866000 r4:84866000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84866000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7d80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84866000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510fb8c r4:8510f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510fb8c r4:85094f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84866000 r8:85094f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85094f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85094f00 r8:8027ecf4 r7:ea8e5e60 r6:85094f80 r5:84866000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7840 INFO: task kworker/0:253:4065 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cb494000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:4067 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:84866c00 r4:84866c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84866c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850688c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0421000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511c78c r4:8511c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511c78c r4:85099000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84866c00 r8:8509902c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099000 r8:8027ecf4 r7:eaa81e60 r6:85099080 r5:84866c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa89fb0 to 0xeaa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7ac0 INFO: task kworker/0:254:4067 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cb6cd000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:4070 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:84865400 r4:84865400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84865400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84865400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd3b8c r4:84bd3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd3b8c r4:85060600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84865400 r8:8506062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060600 r8:8027ecf4 r7:ea85de60 r6:85099180 r5:84865400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ac180 INFO: task kworker/1:221:4070 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cbabb000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4071 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa75d84 r8:00000002 r7:60000013 r6:eaa75d8c r5:84863c00 r4:84863c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84863c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe25000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510ff8c r4:8510fc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510ff8c r4:85099100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863c00 r8:8509912c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099100 r8:8027ecf4 r7:eaa89e60 r6:85099200 r5:84863c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7c80 INFO: task kworker/0:255:4071 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cbe1a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:4074 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea935d84 r8:00000002 r7:60000013 r6:ea935d8c r5:84b96c00 r4:84b96c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b96c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a17c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515d38c r4:8515d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515d38c r4:85060680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b96c00 r8:850606ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060680 r8:8027ecf4 r7:ea85de60 r6:85060700 r5:84b96c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea935fb0 to 0xea935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ac2c0 INFO: task kworker/1:222:4074 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cc16e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4075 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:84b93c00 r4:84b93c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b93c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ac880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847baf8c r4:847bac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847baf8c r4:85060780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93c00 r8:850607ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060780 r8:8027ecf4 r7:ea935e60 r6:85060800 r5:84b93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ac2c0 INFO: task kworker/1:223:4075 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cc36b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:4077 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:4077 tgid:4077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:84b8d400 r4:84b8d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b8d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85090e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e040c000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511c38c r4:8511c000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511c38c r4:85099280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8d400 r8:850992ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099280 r8:8027ecf4 r7:eaa89e60 r6:85060880 r5:84b8d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85090f00 INFO: task kworker/0:256:4077 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cc89b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:4079 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa99d84 r8:00000002 r7:60000013 r6:eaa99d8c r5:85120000 r4:85120000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85120000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a80c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e043b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cb8c r4:8511c800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511cb8c r4:85099300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120000 r8:8509932c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099300 r8:8027ecf4 r7:eaa89e60 r6:85060900 r5:85120000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a7900 INFO: task kworker/0:257:4079 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cca9e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:4080 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa9dd84 r8:00000002 r7:60000013 r6:eaa9dd8c r5:85120c00 r4:85120c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85120c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511d78c r4:8511d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511d78c r4:85099380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120c00 r8:850993ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099380 r8:8027ecf4 r7:eaa99e60 r6:85060980 r5:85120c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa9dfb0 to 0xeaa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8100 INFO: task kworker/0:258:4080 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ccd9c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4083 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:85121800 r4:85121800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85121800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a83c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85121800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0495000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cf8c r4:8511cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511cf8c r4:85099400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85121800 r8:8509942c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099400 r8:8027ecf4 r7:eaa9de60 r6:85060a00 r5:85121800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a82c0 INFO: task kworker/0:259:4083 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cce22000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:4084 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaa5d84 r8:00000002 r7:60000113 r6:eaaa5d8c r5:85122400 r4:85122400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85122400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850acd00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85122400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515c38c r4:8515c000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515c38c r4:85060a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85122400 r8:85060aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060a80 r8:8027ecf4 r7:ea935e60 r6:85060b00 r5:85122400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ac7c0 INFO: task kworker/1:224:4084 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cd241000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4087 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaa9d84 r8:00000002 r7:60000013 r6:eaaa9d8c r5:85123000 r4:85123000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8540 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511d38c r4:8511d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511d38c r4:85099480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123000 r8:850994ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099480 r8:8027ecf4 r7:eaa9de60 r6:85060b80 r5:85123000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8200 INFO: task kworker/0:260:4087 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cd647000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:4089 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:85123c00 r4:85123c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ff000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511db8c r4:8511d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511db8c r4:85099500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123c00 r8:8509952c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099500 r8:8027ecf4 r7:eaa9de60 r6:85060c00 r5:85123c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a82c0 INFO: task kworker/0:261:4089 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cd6a3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:4091 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:4091 tgid:4091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaab1d84 r8:00000002 r7:60000113 r6:eaab1d8c r5:85124800 r4:85124800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85124800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a89c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85124800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46eb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511df8c r4:8511dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511df8c r4:85099580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85124800 r8:850995ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099580 r8:8027ecf4 r7:eaaade60 r6:85060c80 r5:85124800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8600 INFO: task kworker/0:262:4091 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cd9ec000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:4093 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:85125400 r4:85125400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85125400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850acf40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85125400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e874d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515c78c r4:8515c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515c78c r4:85060d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85125400 r8:85060d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060d00 r8:8027ecf4 r7:ea935e60 r6:85060d80 r5:85125400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850acb80 INFO: task kworker/1:225:4093 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cdb51000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4094 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4094 tgid:4094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaab9d84 r8:00000002 r7:60000113 r6:eaab9d8c r5:85126000 r4:85126000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85126000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8763000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e38c r4:8511e000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511e38c r4:85099600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126000 r8:8509962c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099600 r8:8027ecf4 r7:eaab1e60 r6:85060e00 r5:85126000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8840 INFO: task kworker/0:263:4094 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cdcf4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:4098 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaab5d84 r8:00000002 r7:60000013 r6:eaab5d8c r5:85126c00 r4:85126c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85126c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8f80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85126c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8e7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ef8c r4:8511ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511ef8c r4:85099680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126c00 r8:850996ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099680 r8:8027ecf4 r7:eaab9e60 r6:85060e80 r5:85126c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab5fb0 to 0xeaab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8a40 INFO: task kworker/0:264:4098 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ce17e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:4099 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaac1d84 r8:00000002 r7:60000013 r6:eaac1d8c r5:85128000 r4:85128000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85128000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a1680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85128000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cf8c r4:8515cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515cf8c r4:85060f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128000 r8:85060f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85060f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85060f00 r8:8027ecf4 r7:ea935e60 r6:85060f80 r5:85128000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ace80 INFO: task kworker/1:226:4099 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ce266000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4101 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaac5d84 r8:00000002 r7:60000013 r6:eaac5d8c r5:85128c00 r4:85128c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85128c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85128c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e877b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e78c r4:8511e400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511e78c r4:85099700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128c00 r8:8509972c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099700 r8:8027ecf4 r7:eaab5e60 r6:8509f000 r5:85128c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8b80 INFO: task kworker/0:265:4101 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ce57e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:4102 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:85129800 r4:85129800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85129800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a8e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85129800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea78f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511eb8c r4:8511e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511eb8c r4:85099780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85129800 r8:850997ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099780 r8:8027ecf4 r7:eaab5e60 r6:8509f080 r5:85129800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8b80 INFO: task kworker/0:266:4102 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ce82a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:4105 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:8512a400 r4:8512a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a82c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511f38c r4:8511f000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511f38c r4:85099800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512a400 r8:8509982c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099800 r8:8027ecf4 r7:eaab5e60 r6:8509f100 r5:8512a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a8d80 INFO: task kworker/0:267:4105 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ceb3b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:4112 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaddd84 r8:00000002 r7:60000013 r6:eaaddd8c r5:8512bc00 r4:8512bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a1bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515df8c r4:8515dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515df8c r4:8509f180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512bc00 r8:8509f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509f180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509f180 r8:8027ecf4 r7:ea935e60 r6:8509f200 r5:8512bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a1640 INFO: task kworker/1:227:4112 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cee08000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:4113 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:8512c800 r4:8512c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a18c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515d78c r4:8515d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515d78c r4:8509f280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512c800 r8:8509f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509f280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509f280 r8:8027ecf4 r7:eaadde60 r6:8509f300 r5:8512c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a1640 INFO: task kworker/1:228:4113 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cf006000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:4114 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaae5d84 r8:00000002 r7:60000113 r6:eaae5d8c r5:8512d400 r4:8512d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a1940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515db8c r4:8515d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515db8c r4:8509f380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512d400 r8:8509f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509f380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509f380 r8:8027ecf4 r7:eaadde60 r6:8509f400 r5:8512d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a1000 INFO: task kworker/1:229:4114 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cf57b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:4117 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:8512ec00 r4:8512ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a7900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea939000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511f78c r4:8511f400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511f78c r4:85099880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512ec00 r8:850998ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099880 r8:8027ecf4 r7:eaad5e60 r6:8509f480 r5:8512ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a3300 INFO: task kworker/0:268:4117 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cf57b000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4119 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaedd84 r8:00000002 r7:60000113 r6:eaaedd8c r5:8512b000 r4:8512b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095140 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e037f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ef8c r4:8515ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515ef8c r4:85099900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a3300 INFO: task kworker/0:269:4119 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cfad7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85130000 r5:85130000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff85000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515e38c r4:8515e000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515e38c r4:8509f580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85130000 r8:8509f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509f580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509f580 r8:8027ecf4 r7:eaadde60 r6:8509f600 r5:85130000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a1a40 INFO: task kworker/1:230:4120 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: cfe20000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:4121 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaf5d84 r8:00000002 r7:60000013 r6:eaaf5d8c r5:85130c00 r4:85130c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85130c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a1280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85130c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515e78c r4:8515e400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515e78c r4:8509f680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85130c00 r8:8509f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509f680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4122 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaf9d84 r8:00000002 r7:60000113 r6:eaaf9d8c r5:85131800 r4:85131800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85131800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85131800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8515f78c r4:8515f400 r4:8509f780 Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) INFO: task kworker/1:232:4122 is blocked on a mutex likely owned by task kworker/0:151:3776. dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:4124 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaafdd84 r8:00000002 r7:60000113 r6:eaafdd8c r5:85133000 r4:85133000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85133000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ab000 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85133000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e034d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515eb8c r4:8515e800 r7:ddde2d40 r6:83018200 r5:8515eb8c r4:8509f880 Exception stack(0xeaafdfb0 to 0xeaafdff8) r4:850a1c40 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d0754000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 INFO: task kworker/0:270:4125 blocked for more than 461 seconds. r4:85133c00 r5:85133c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0673000 r7:dddced40 r6:83018000 r5:8511fb8c r4:85099980 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a3300 INFO: task kworker/0:270:4125 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d0d33000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe46fdfb0 to 0xe46fdff8) INFO: task kworker/1:234:4128 blocked for more than 461 seconds. r5:85135400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r5:00001000 r4:e0573000 r10:61c88647 r9:85135400 r8:8509fa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d0d33000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:4131 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85132400 r5:85132400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:00001000 r4:e0641000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c38c r4:8516c000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516c38c r4:8509fb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85132400 r8:8509fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509fb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509fb00 r8:8027ecf4 r7:eaaf9e60 r6:8509fb80 r5:85132400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab05fb0 to 0xeab05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850953c0 INFO: task kworker/1:235:4131 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d1013000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85136000 r5:85136000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515fb8c r4:8515f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515fb8c r4:8509fc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136000 r8:8509fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509fc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509fc00 r8:8027ecf4 r7:eab05e60 r6:8509fc80 r5:85136000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85095700 INFO: task kworker/1:236:4133 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d1371000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85136c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850957c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85136c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05db000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ff8c r4:8515fc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8515ff8c r4:8509fd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136c00 r8:8509fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850953c0 INFO: task kworker/1:237:4135 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d1ad9000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:84753d00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:238 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:85134800 r4:85134800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85134800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095980 r7:ddde2d40 r6:83018200 r5:847c438c r4:8509fe00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85134800 r8:8509fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509fe00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509fe00 r8:8027ecf4 r7:eab05e60 r6:8509fe80 r5:85134800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850953c0 INFO: task kworker/1:238:4137 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d1d60000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8512e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095f00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7a3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516cb8c r4:8516c800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516cb8c r4:8509ff00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512e000 r8:8509ff2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509ff00 r10:00000000 r9:8509ff00 r8:8027ecf4 r7:eab05e60 r6:8509ff80 r5:8512e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:240:4141 blocked for more than 461 seconds. r4:85138000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85138000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85095c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85138000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0659000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c78c r4:8516c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516c78c r4:85086000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138000 r8:8508602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086000 r8:8027ecf4 r7:eab15e60 r6:85086080 r5:85138000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:dddced40 r6:83018000 r5:851d438c r4:85099a00 r10:61c88647 r9:85138c00 r8:85099a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85099a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099a00 r8:8027ecf4 r7:eaae9e60 r6:85086100 r5:85138c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab21fb0 to 0xeab21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a3880 INFO: task kworker/0:271:4143 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d2e64000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r4:84753d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8513a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea837000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d78c r4:8516d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516d78c r4:85086180 r10:61c88647 r9:8513a400 r8:850861ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85095d80 INFO: task kworker/1:241:4145 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r5:8502278c r4:85022400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848cb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b1c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7bd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516cf8c r4:8516cc00 r10:00000000 r9:85086280 r8:8027ecf4 r7:eab25e60 r6:85099a80 r5:848cb000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848c8c00 r5:848c8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b2c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea813000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d38c r4:8516d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516d38c r4:85086300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8c00 r8:8508632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086300 r8:8027ecf4 r7:eab25e60 r6:85099b00 r5:848c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d3471000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848cd400 r5:848cd400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ff8c r4:8511fc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511ff8c r4:85099b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cd400 r8:85099bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85099b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85099b80 r8:8027ecf4 r7:eab21e60 r6:85099c00 r5:848cd400 r4:00000001 Exception stack(0xeab3dfb0 to 0xeab3dff8) Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d3867000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8502278c r4:85022400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848ce000 r5:848ce000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8516df8c r4:8516dc00 r4:85086380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bb0 r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4153 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab45d84 r8:00000002 r7:60000013 r6:eab45d8c r5:848cbc00 r4:848cbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b540 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea84b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8516db8c r4:8516d800 r4:00000001 Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508b480 INFO: task kworker/1:245:4153 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d3e2f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:848cc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85086480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086480 r8:8027ecf4 r7:eab41e60 r6:85099d80 r5:848cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508b3c0 INFO: task kworker/1:246:4155 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d4067000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:4158 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:848cec00 r4:848cec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848cec00 r8:8508652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80000013 ffffffff r4:e46fddc0 r4:00000000 r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:4159 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:848c9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:848c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r10:00000000 r9:85086580 r8:8027ecf4 r7:eab51e60 r6:85099e80 r5:848c9800 Call trace: r5:80000013 r4:80239bb0 r4:00000000 r5:8502278c r4:85022400 Exception stack(0xe46fdfb0 to 0xe46fdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:844a8000 r4:829187f0 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bfc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516fb8c r4:8516f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516fb8c r4:85086600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a8000 r8:8508662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086600 r8:8027ecf4 r7:eab51e60 r6:85099f00 r5:844a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508b9c0 INFO: task kworker/1:249:4163 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d4649000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:8502278c r4:85022400 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:844a8c00 r4:844a8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bbc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea965000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ef8c r4:8516ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516ef8c r4:85086680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a8c00 r8:850866ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086680 r8:8027ecf4 r7:eab61e60 r6:85099f80 r5:844a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4165 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab69d84 r8:00000002 r7:60000013 r6:eab69d8c r5:844a9800 r4:844a9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bd80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea973000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516f38c r4:8516f000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516f38c r4:85086700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a9800 r8:8508672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086700 r8:8027ecf4 r7:eab61e60 r6:8506f000 r5:844a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4167 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab49d84 r8:00000002 r7:60000113 r6:eab49d8c r5:8513bc00 r4:8513bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8513bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508be80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516f78c r4:8516f400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516f78c r4:85086780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513bc00 r8:850867ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086780 r8:8027ecf4 r7:eab61e60 r6:85086800 r5:8513bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8508bc00 INFO: task kworker/1:252:4167 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d48f4000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:253 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8513c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8513c800 r8:850868ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:4172 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:8513d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8513d400 r8:850869ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086980 r8:8027ecf4 r7:eab6de60 r6:85086a00 r5:8513d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85095fc0 INFO: task kworker/1:254:4172 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d4f58000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8513e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85174f8c r4:85174c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85174f8c r4:85086a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513e000 r8:85086aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086a80 r8:8027ecf4 r7:eab6de60 r6:85086b00 r5:8513e000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80000013 ffffffff r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8513ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517478c r4:85174400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517478c r4:85086b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513ec00 r8:85086bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086b80 r8:8027ecf4 r7:eab79e60 r6:85086c00 r5:8513ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85054040 INFO: task kworker/1:256:4175 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d52a9000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e46fddc0 r5:00001000 r4:e042b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8513b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8513b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85174b8c r4:85174800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85174b8c r4:85086c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513b000 r8:85086cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086c80 r8:8027ecf4 r7:eab79e60 r6:85086d00 r5:8513b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85054380 INFO: task kworker/1:257:4178 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d5431000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753d00 Exception stack(0xe46fdfb0 to 0xe46fdff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85139800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85139800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850545c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85139800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517538c r4:85175000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517538c r4:85086d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85139800 r8:85086dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086d80 r8:8027ecf4 r7:eab79e60 r6:85086e00 r5:85139800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850542c0 INFO: task kworker/1:258:4180 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xe46fdd20 to 0xe46fdd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:4182 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab89d84 r8:00000002 r7:60000013 r6:eab89d8c r5:85140c00 r4:85140c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85140c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85140c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa23000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175b8c r4:85175800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85175b8c r4:85086e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140c00 r8:85086eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85086e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85086e80 r8:8027ecf4 r7:eab85e60 r6:85086f00 r5:85140c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850543c0 INFO: task kworker/1:259:4182 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4184 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab8dd84 r8:00000002 r7:60000013 r6:eab8dd8c r5:85140000 r4:85140000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85140000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeab8dfb0 to 0xeab8dff8) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:4187 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:85142400 r4:85142400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85142400 r4:829187f0 r4:00000000 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeab81fb0 to 0xeab81ff8) Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d5b7a000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:262:4189 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:262 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab91d84 r8:00000002 r7:60000013 r6:eab91d8c r5:85143000 r4:85143000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85143000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85143000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb7d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175f8c r4:85175c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85175f8c r4:85048180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85143000 r8:850481ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048180 r8:8027ecf4 r7:eab81e60 r6:85048200 r5:85143000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85054940 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:e042b000 r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:85143c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85143c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517638c r4:85176000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517638c r4:85048280 r4:85048280 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:264 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85144800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85144800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85176f8c r4:85176c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85176f8c r4:85048380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85144800 r8:850483ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048380 r8:8027ecf4 r7:eab81e60 r6:85048400 r5:85144800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85054c40 INFO: task kworker/1:264:4194 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e46fddc0 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:265:4195 blocked for more than 462 seconds. r5:85145400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r5:85176b8c r4:85176800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85176b8c r4:85048480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85145400 r8:850484ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048480 r8:8027ecf4 r7:eab99e60 r6:85048500 r5:85145400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042080 INFO: task kworker/1:265:4195 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d665f000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:266 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85146c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8517738c r4:85048580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85146c00 r8:850485ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048580 r8:8027ecf4 r7:eab99e60 r6:85048600 r5:85146c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850422c0 INFO: task kworker/1:266:4198 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d6b93000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:844bb340 Workqueue: events bpf_prog_free_deferred r5:844aa400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518038c r4:85180000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518038c r4:85048680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844aa400 r8:850486ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048680 r8:8027ecf4 r7:eab9de60 r6:8506f080 r5:844aa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850422c0 INFO: task kworker/1:267:4199 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d6dc2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:8502278c r4:85022400 r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:268 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844ac800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850425c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0423000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517778c r4:85177400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517778c r4:85048700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ac800 r8:8504872c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048700 r8:8027ecf4 r7:eaba9e60 r6:8506f100 r5:844ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850422c0 INFO: task kworker/1:268:4200 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d6dc2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4203 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844ad400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85048780 r8:8027ecf4 r7:eaba9e60 r6:8506f180 r5:844ad400 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e46fddc0 r5:00001000 r4:e042b000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:4205 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:85146000 r4:85146000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85146000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85146000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177f8c r4:85177c00 r7:ddde2d40 r6:83018200 r5:85177f8c r4:85048800 Exception stack(0xeabb1fb0 to 0xeabb1ff8) r4:850427c0 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4208 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabb5d84 r8:00000002 r7:60000013 r6:eabb5d8c r5:85141800 r4:85141800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85141800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85141800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8759000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85180f8c r4:85180c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85180f8c r4:85048900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85141800 r8:8504892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048900 r8:8027ecf4 r7:eaba9e60 r6:85048980 r5:85141800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb5fb0 to 0xeabb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042800 INFO: task kworker/1:271:4208 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d77f3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:844bb340 Workqueue: events bpf_prog_free_deferred r5:85148000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042b00 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85042800 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d7a03000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:4212 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:273 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85148c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042d80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85148c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46ed000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85180b8c r4:85180800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85180b8c r4:85048b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85148c00 r8:85048b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048b00 r8:8027ecf4 r7:eabb5e60 r6:85048b80 r5:85148c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042dc0 INFO: task kworker/1:273:4212 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:274:4214 blocked for more than 462 seconds. r10:829187f4 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:85149800 r5:85149800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85054dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85149800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8771000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518138c r4:85181000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518138c r4:85048c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85149800 r8:85048c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048c00 r8:8027ecf4 r7:eabb5e60 r6:85048c80 r5:85149800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042c80 INFO: task kworker/1:274:4214 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe46fdd20 to 0xe46fdd68) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:275:4216 blocked for more than 462 seconds. r5:8514a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042fc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514a400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8bf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518178c r4:85181400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518178c r4:85048d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514a400 r8:85048d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048d00 r8:8027ecf4 r7:eabc5e60 r6:85048d80 r5:8514a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85054680 INFO: task kworker/1:275:4216 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d838c000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:e042b000 r4:84753d00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:276 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8514b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85181b8c r4:85181800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85181b8c r4:85048e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514b000 r8:85048e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048e00 r8:8027ecf4 r7:eabc9e60 r6:85048e80 r5:8514b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7c040 INFO: task kworker/1:276:4219 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d84ab000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:277:4220 blocked for more than 463 seconds. [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8514bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea937000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85181f8c r4:85181c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85181f8c r4:85048f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514bc00 r8:85048f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048f00 r8:8027ecf4 r7:eabcde60 r6:85048f80 r5:8514bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:844bb340 Workqueue: events bpf_prog_free_deferred r5:8514d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c4c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa27000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518238c r4:85182000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518238c r4:84a74000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514d400 r8:84a7402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74000 r8:8027ecf4 r7:eabc1e60 r6:84a74080 r5:8514d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a7c200 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4223 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:8514e000 r4:8514e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7ca00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabff000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518278c r4:85182400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518278c r4:84a74100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514e000 r8:84a7412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74100 r8:8027ecf4 r7:eabd5e60 r6:84a74180 r5:8514e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:4226 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:85150c00 r4:85150c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85150c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85150c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabeb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d478c r4:851d4400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d478c r4:8506f200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150c00 r8:8506f22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506f200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506f200 r8:8027ecf4 r7:eab21e60 r6:84a74200 r5:85150c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847551c0 INFO: task kworker/0:273:4226 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e46fddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r5:8502278c r4:85022400 r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85151800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85151800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d4b8c r4:851d4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d4b8c r4:8506f280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85151800 r8:8506f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506f280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506f280 r8:8027ecf4 r7:eabf9e60 r6:84a74280 r5:85151800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847551c0 INFO: task kworker/0:274:4228 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d93ec000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e042b000 r5:8502278c r4:85022400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85153000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:4232 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac15d84 r8:00000002 r7:60000013 r6:eac15d8c r5:85152400 r4:85152400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85152400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85152400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac77000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519078c r4:85190400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519078c r4:84a74400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85152400 r8:84a7442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74400 r8:8027ecf4 r7:eac09e60 r6:84a74480 r5:85152400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7c880 INFO: task kworker/1:281:4232 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d9c68000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e46fddc0 r4:00000000 r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:282 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85153c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7cd40 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85182f8c r4:85182c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85182f8c r4:84a74500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85153c00 r8:84a7452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74500 r8:8027ecf4 r7:eac15e60 r6:84a74580 r5:85153c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a7cd80 INFO: task kworker/1:282:4233 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d9c68000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85154800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85154800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d578c r4:851d5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d578c r4:8506f300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85154800 r8:8506f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506f300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506f300 r8:8027ecf4 r7:eabfde60 r6:84a74600 r5:85154800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84755200 INFO: task kworker/0:275:4236 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: d9fdf000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r4:84753d00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:283 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85155400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad600 r5:8518378c r4:85183400 r10:61c88647 r9:85155400 r8:84a746ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe46fdd20 to 0xe46fdd68) r5:00001000 r4:e042b000 r4:84753d00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85156000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518338c r4:85183000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518338c r4:8506f380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156000 r8:8506f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506f380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506f380 r8:8027ecf4 r7:eac31e60 r6:84a74780 r5:85156000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84755200 INFO: task kworker/0:276:4238 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: da5ea000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:277:4239 blocked for more than 463 seconds. r5:8514ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755d40 r7:dddced40 r6:83018000 r5:851d538c r4:8506f400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:844bb340 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:844abc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac53000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85183b8c r4:85183800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85183b8c r4:84a74880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844abc00 r8:84a748ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74880 r8:8027ecf4 r7:eac15e60 r6:8506f480 r5:844abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4245 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabe9d84 r8:00000002 r7:60000013 r6:eabe9d8c r5:844aec00 r4:844aec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844aec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e46fddc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:286 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844ab000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519038c r4:85190000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519038c r4:84a74980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ab000 r8:84a749ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74980 r8:8027ecf4 r7:eac15e60 r6:8506f580 r5:844ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad780 INFO: task kworker/1:286:4247 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: db112000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:4249 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:85150000 r4:85150000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85150000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadbc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85150000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac83000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85190b8c r4:85190800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85190b8c r4:84a74a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:84a74a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74a00 r8:8027ecf4 r7:eac15e60 r6:84a74a80 r5:85150000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aad940 INFO: task kworker/1:287:4249 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: db594000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8502278c r4:85022400 r4:84753d00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4251 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85156c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a74b00 Exception stack(0xeac81fb0 to 0xeac81ff8) INFO: task kworker/1:288:4251 is blocked on a mutex likely owned by task kworker/0:151:3776. Exception stack(0xe46fdd20 to 0xe46fdd68) [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:4252 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaca1d84 r8:00000002 r7:60000013 r6:eaca1d8c r5:8514c800 r4:8514c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r4:e46fddc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:4255 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:85210000 r4:85210000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadfc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85210000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac97000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519138c r4:85191000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519138c r4:84a74d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210000 r8:84a74d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74d00 r8:8027ecf4 r7:eac81e60 r6:84a74d80 r5:85210000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:84aadc40 Workqueue: events bpf_prog_free_deferred [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e46fddc0 r4:00000000 r5:8502278c r4:85022400 r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 INFO: task kworker/1:291:4257 blocked for more than 463 seconds. r5:85211800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84809040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85211800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85191f8c r4:85191c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85191f8c r4:84a74e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85211800 r8:84a74e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a74e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a74e00 r8:8027ecf4 r7:eac81e60 r6:84a74e80 r5:85211800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84aadf40 INFO: task kworker/1:291:4257 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dbe7d000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:292:4258 blocked for more than 463 seconds. r10:829187f4 r9:eacc1d84 r8:00000002 r7:60000013 r6:eacc1d8c r5:85212400 r5:85212400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7c600 r5:85191b8c r4:85191800 r10:61c88647 r9:85212400 r8:84a74f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeacc1fb0 to 0xeacc1ff8) INFO: task kworker/1:292:4258 is blocked on a mutex likely owned by task kworker/0:151:3776. r5:80000013 r4:80239bb0 r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:4264 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab59d84 r8:00000002 r7:60000013 r6:eab59d8c r5:85210c00 r4:85210c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84809280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85210c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa49000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519238c r4:85192000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519238c r4:84a77000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210c00 r8:84a7702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a77000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77000 r8:8027ecf4 r7:eaca5e60 r6:84a77080 r5:85210c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84809100 INFO: task kworker/1:293:4264 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dc68e000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85214800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085fc0 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85192b8c r4:85192800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85192b8c r4:84a77100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:84a7712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a77100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77100 r8:8027ecf4 r7:eab59e60 r6:84a77180 r5:85214800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84809100 INFO: task kworker/1:294:4265 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd60: 80000013 ffffffff r4:e46fddc0 r5:00001000 r4:e042b000 r4:84753d00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85216000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:84a77200 r8:8027ecf4 r7:eacc5e60 r6:84a77280 r5:85216000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dcda7000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:8502278c r4:85022400 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:829187f4 r9:eacd1d84 r8:00000002 r7:60000013 r6:eacd1d8c r5:85216c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84755d00 Call trace: r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dd338000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 r4:844bb340 Workqueue: events bpf_prog_free_deferred r5:85213c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755fc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85213c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff61000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d5b8c r4:851d5800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d5b8c r4:8506f680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:8506f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506f680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506f680 r8:8027ecf4 r7:eacd1e60 r6:84a77380 r5:85213c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84755e80 INFO: task kworker/0:279:4269 is blocked on a mutex likely owned by task kworker/0:151:3776. Call trace: dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:e46fddc0 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753d00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:280 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85218000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0603000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d738c r4:851d7000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d738c r4:8506f700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:8506f72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506f700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506f700 r8:8027ecf4 r7:eacd1e60 r6:84a77400 r5:85218000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84755e00 INFO: task kworker/0:280:4271 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: ddab2000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eace9d84 r8:00000002 r7:60000113 r6:eace9d8c r5:8521a400 r5:8521a400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84755640 r7:dddced40 r6:83018000 r5:851d638c r4:8506f780 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:4276 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:85218c00 r4:85218c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84724740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0567000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:e042b000 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:4278 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85219800 r5:85219800 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80000013 ffffffff r4:00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4279 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead05d84 r8:00000002 r7:60000113 r6:ead05d8c r5:8521c800 r4:8521c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849652c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d6f8c r4:851d6c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d6f8c r4:8506f900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521c800 r8:8506f92c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:284:4279 is blocked on a mutex likely owned by task kworker/0:151:3776. r4:e46fddc0 r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:4282 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead0dd84 r8:00000002 r7:60000113 r6:ead0dd8c r5:8521b000 r4:8521b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r5:851d778c r4:851d7400 r10:00000000 r9:8506f980 r8:8027ecf4 r7:eacdde60 r6:84a77680 r5:8521b000 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: debeb000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:844bb340 task:kworker/0:286 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8521d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521d400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea849000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d878c r4:851d8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d878c r4:8506fa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521d400 r8:8506fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fa00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fa00 r8:8027ecf4 r7:ead0de60 r6:84a77700 r5:8521d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84965400 INFO: task kworker/0:286:4285 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dee36000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:4286 blocked for more than 464 seconds. task:kworker/0:287 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8521ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8506fa80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dee36000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4287 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead21d84 r8:00000002 r7:60000113 r6:ead21d8c r5:8521bc00 r4:8521bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea79b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d7f8c r4:851d7c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d7f8c r4:8506fb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521bc00 r8:8506fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fb00 r8:8027ecf4 r7:ead19e60 r6:84a77800 r5:8521bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84965480 INFO: task kworker/0:288:4287 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: df3a3000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:4289 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:85215400 r4:85215400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85215400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85215400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7c3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841efb8c r4:841ef800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841efb8c r4:8506fb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85215400 r8:8506fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fb80 r8:8027ecf4 r7:ead19e60 r6:84a77880 r5:85215400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:849657c0 INFO: task kworker/0:289:4289 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: df5c5000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:4291 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead31d84 r8:00000002 r7:60000013 r6:ead31d8c r5:85220000 r4:85220000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85220000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea82f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d838c r4:851d8000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d838c r4:8506fc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85220000 r8:8506fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fc00 r8:8027ecf4 r7:ead19e60 r6:84a77900 r5:85220000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84965700 INFO: task kworker/0:290:4291 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dfc75000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4293 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:85221800 r4:85221800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85221800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85221800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea89d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d8f8c r4:851d8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d8f8c r4:8506fc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85221800 r8:8506fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fc80 r8:8027ecf4 r7:ead19e60 r6:84a77980 r5:85221800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead41fb0 to 0xead41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84965940 INFO: task kworker/0:291:4293 is blocked on a mutex likely owned by task kworker/0:151:3776. task:kworker/0:151 state:R running task stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b8c00 r8:80200be4 r7:e46fdd54 r6:ffffffff r5:848b8c00 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe46fdd20 to 0xe46fdd68) dd20: dfc75000 e0410000 00000001 80239b98 7f16d000 00000001 82ac21c4 82ac15a0 dd40: 7f16d000 e0410000 8280c9b4 e46fdd9c e46fdda0 e46fdd70 80230ad4 80239bb0 dd60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e46fddc0 r5:e46fde08 r4:e46fddc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502278c r4:85022400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:84753d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753d00 r8:8027ecf4 r7:e46f9e60 r6:84753d80 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:4295 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:85220c00 r4:85220c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85220c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb840 r7:dddced40 r6:83018000 r5:8502278c r4:84753d00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46fdfb0 to 0xe46fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb340 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4298 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead4dd84 r8:00000002 r7:60000113 r6:ead4dd8c r5:85223000 r4:85223000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84965fc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea943000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d938c r4:851d9000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d938c r4:8506fd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223000 r8:8506fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fd80 r8:8027ecf4 r7:ead41e60 r6:84a77a80 r5:85223000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead4dfb0 to 0xead4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84965c80 INFO: task kworker/0:293:4298 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 7f330000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85223c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:4303 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:ead71d84 r8:00000002 r7:60000013 r6:ead71d8c r5:85226000 r5:85226000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea979000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d9b8c r4:851d9800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851d9b8c r4:8506fe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226000 r8:8506feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506fe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506fe80 r8:8027ecf4 r7:ead55e60 r6:84a77b80 r5:85226000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 90000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:296 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85226c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504f500 r5:851da78c r4:851da400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851da78c r4:8506ff00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226c00 r8:8506ff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506ff00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ff00 r8:8027ecf4 r7:ead71e60 r6:84a77c00 r5:85226c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84965dc0 INFO: task kworker/0:296:4304 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 7fa97000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848ca400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504f0c0 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4308 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead7dd84 r8:00000002 r7:60000113 r6:ead7dd8c r5:848c8000 r4:848c8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504f300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851da38c r4:851da000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851da38c r4:8505d080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8000 r8:8505d0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8505d080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d080 r8:8027ecf4 r7:ead79e60 r6:8505d100 r5:848c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504f200 INFO: task kworker/0:298:4308 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 7fdbd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4311 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadb1d84 r8:00000002 r7:60000013 r6:eadb1d8c r5:85222400 r4:85222400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85222400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504f5c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dab8c r4:851da800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dab8c r4:8505d180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85222400 r8:8505d1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8505d180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d180 r8:8027ecf4 r7:ead79e60 r6:84a77c80 r5:85222400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504f380 INFO: task kworker/0:299:4311 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844bb800 Call trace: r5:8521e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504fec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead73000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dbf8c r4:851dbc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dbf8c r4:8505d200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521e000 r8:8505d22c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85225400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504f740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85225400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9db000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851daf8c r4:851dac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851daf8c r4:8505d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85225400 r8:8505d2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8505d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d280 r8:8027ecf4 r7:eadbde60 r6:84a77d80 r5:85225400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504f440 INFO: task kworker/0:301:4314 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe8709d20 to 0xe8709d68) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844bb800 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadcdd84 r8:00000002 r7:60000013 r6:eadcdd8c r5:85224800 r4:85224800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85224800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504f880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85224800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851db38c r4:851db000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504f540 INFO: task kworker/0:302:4315 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 80aa8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:85228000 r5:85228000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85228000 r8:8505d3ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 80e8b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:304:4318 blocked for more than 465 seconds. r5:85228c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8505d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r4:00000000 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:4321 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:85229800 r4:85229800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85229800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a77f80 5fa0: 00000000 00000000 00000000 00000000 r4:85085dc0 INFO: task kworker/1:296:4321 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8145f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:297 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8522a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85193b8c r4:8508f080 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8145f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:4326 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8522b000 r4:829187f0 r4:00000000 r5:8519338c r4:85193000 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4328 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:8522bc00 r4:8522bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504fcc0 INFO: task kworker/0:305:4328 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 81bf1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 INFO: task kworker/0:306:4330 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadedd84 r8:00000002 r7:60000013 r6:eadedd8c r5:8522c800 r4:8522c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e8709dc0 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:307:4332 blocked for more than 465 seconds. r5:8522d400 r4:829187f0 r4:00000000 r7:dddced40 r6:83018000 r5:851dcb8c r4:8505d580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504ffc0 INFO: task kworker/0:307:4332 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 81de1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8522e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c440 r10:61c88647 r9:8522e000 r8:8505d62c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r4:e8709dc0 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507c1c0 INFO: task kworker/0:309:4337 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 821cd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:310 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4340 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:eabf1d84 r8:00000002 r7:60000013 r6:eabf1d8c r5:85230c00 r4:00000000 r5:851ddf8c r4:851ddc00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d60: 80000013 ffffffff r5:00001000 r4:e0439000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850846c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85231800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85193f8c r4:85193c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85193f8c r4:8508f600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85231800 r8:8508f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508f600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508f600 r8:8027ecf4 r7:eadd9e60 r6:8508f680 r5:85231800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 8277a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:300 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85232400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850def80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85232400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf41000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526038c r4:85260000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526038c r4:8508f700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85232400 r8:8508f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 INFO: task kworker/1:300:4345 is blocked on a mutex likely owned by task kworker/0:153:3780. r4:e8709dc0 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:301 state:D stack:0 pid:4347 tgid:4347 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:851df38c r4:851df000 r10:00000000 r9:8508f800 r8:8027ecf4 r7:eac11e60 r6:8508f880 r5:85233000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 82eb5000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85233c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:851ddb8c r4:8505d800 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85234800 r5:85234800 r4:829187f0 r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4353 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac41d84 r8:00000002 r7:60000013 r6:eac41d8c r5:85235400 r4:85235400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85235400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507cdc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85235400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851de78c r4:851de400 r4:8505d900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85236000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507cf40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85236000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04dd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851deb8c r4:851de800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851deb8c r4:8505d980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236000 r8:8505d9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8505d980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505d980 r8:8027ecf4 r7:eac41e60 r6:8508fa80 r5:85236000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507cc40 INFO: task kworker/0:315:4355 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 83827000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:316 state:D stack:0 pid:4357 tgid:4357 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85236c00 r4:829187f0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 80000013 ffffffff r4:e8709dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4359 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:85238000 r4:85238000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85238000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c5c0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8505da80 9fa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 80000013 ffffffff r4:e8709dc0 r5:00001000 r4:e0439000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85238c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8508fc00 dfa0: 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:8523a400 r4:8523a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea78d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dfb8c r4:851df800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dfb8c r4:8505db00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523a400 r8:8505db2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8505db00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505db00 r8:8027ecf4 r7:eac7de60 r6:8508fd00 r5:8523a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85053040 INFO: task kworker/0:318:4363 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 84639000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4365 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae35d84 r8:00000002 r7:60000013 r6:eae35d8c r5:8523bc00 r4:8523bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dff8c r4:851dfc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851dff8c r4:8505db80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523bc00 r8:8505dbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8505db80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505db80 r8:8027ecf4 r7:eae2de60 r6:8508fd80 r5:8523bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85053040 INFO: task kworker/0:319:4365 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:848e8000 r4:848e8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848e8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e078c r4:851e0400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e078c r4:8505dc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e8000 r8:8505dc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8505dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505dc00 r8:8027ecf4 r7:eae35e60 r6:8505dc80 r5:848e8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850532c0 INFO: task kworker/0:320:4367 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 84fde000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:00001000 r4:e0439000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:848e9800 r4:829187f0 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:322:4371 blocked for more than 465 seconds. r4:848ea400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ea400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850538c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e0b8c r4:851e0800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e0b8c r4:8505de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ea400 r8:8505de2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8505de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8505de00 r8:8027ecf4 r7:eae1de60 r6:8505de80 r5:848ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e8709dc0 r5:85022b8c r4:85022800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:848eb000 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac51000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e138c r4:851e1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e138c r4:8505df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e8709dc0 r5:00001000 r4:e0439000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848ebc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ebc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053a00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e0f8c r4:851e0c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e0f8c r4:85071000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ebc00 r8:8507102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071000 r8:8027ecf4 r7:eae41e60 r6:85071080 r5:848ebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85053880 INFO: task kworker/0:324:4375 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 85fca000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:325 state:D stack:0 pid:4378 tgid:4378 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848ec800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac79000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e1b8c r4:851e1800 r7:dddced40 r6:83018000 r5:851e1b8c r4:85071100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4380 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:848ed400 r4:848ed400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ed400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e178c r4:851e1400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e178c r4:85071200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeae51fb0 to 0xeae51ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 86264000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:327 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848ee000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507c740 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae55d84 r8:00000002 r7:60000113 r6:eae55d8c r5:848eec00 r5:848eec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85084e00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacaf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e238c r4:851e2000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e238c r4:85071400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848eec00 r8:8507142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071400 r8:8027ecf4 r7:eae3de60 r6:85071480 r5:848eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85084e40 INFO: task kworker/0:328:4383 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r5:80000013 r4:80239bb0 r4:e8709dc0 r5:00001000 r4:e0439000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:329 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848e8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a0040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e278c r4:851e2400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e278c r4:85071500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e8c00 r8:8507152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071500 r8:8027ecf4 r7:eae55e60 r6:85071580 r5:848e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:329:4385 is blocked on a mutex likely owned by task kworker/0:153:3780. r5:80000013 r4:80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:330 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85213000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a01c0 INFO: task kworker/0:330:4387 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 86b7f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:331 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844ae000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a0280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae21000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e2b8c r4:851e2800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e2b8c r4:85071700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ae000 r8:8507172c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071700 r8:8027ecf4 r7:eae5de60 r6:85071780 r5:844ae000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a0100 INFO: task kworker/0:331:4389 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 875b4000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851a0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e338c r4:85071800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0000 r8:8507182c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071800 r8:8027ecf4 r7:eae5de60 r6:85071880 r5:851a0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae6dfb0 to 0xeae6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a02c0 INFO: task kworker/0:332:4391 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 875b4000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:851a0c00 r4:851a0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a0740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae81000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e378c r4:851e3400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e378c r4:85071900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0c00 r8:8507192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071900 r8:8027ecf4 r7:eae6de60 r6:85071980 r5:851a0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a03c0 INFO: task kworker/0:333:4394 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80000013 ffffffff r4:e8709dc0 r5:00001000 r4:e0439000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:334 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851a1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a0900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e3b8c r4:851e3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e3b8c r4:85071a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a1800 r8:85071a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85071a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85071a00 r8:8027ecf4 r7:eae79e60 r6:85071a80 r5:851a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae85fb0 to 0xeae85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 88018000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:851a2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a0b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9df000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e3f8c r4:851e3c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e3f8c r4:85071b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85071b00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 r5:851a3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:851ec78c r4:851ec400 r10:00000000 r9:85071c00 r8:8027ecf4 r7:eae9de60 r6:85071c80 r5:851a3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a09c0 INFO: task kworker/0:336:4399 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 88a8c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:851a3c00 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeaacdfb0 to 0xeaacdff8) Call trace: r4:82ac21e4 r5:00001000 r4:e0439000 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r10:829187f4 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:851a5400 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 894dd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:851a6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85071f00 Exception stack(0xeace5fb0 to 0xeace5ff8) INFO: task kworker/0:339:4404 is blocked on a mutex likely owned by task kworker/0:153:3780. Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 89a80000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4406 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead09d84 r8:00000002 r7:60000013 r6:ead09d8c r5:8523b000 r4:8523b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb340 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523b000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8523b000 r8:850bd02c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:340:4406 is blocked on a mutex likely owned by task kworker/0:153:3780. 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:341 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead25d84 r8:00000002 r7:60000013 r6:ead25d8c r5:8523d400 r4:8523d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0577000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ed78c r4:851ed400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ed78c r4:850bd080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523d400 r8:850bd0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd080 r8:8027ecf4 r7:ead09e60 r6:8508fe80 r5:8523d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bb1c0 INFO: task kworker/0:341:4409 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8a38b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4411 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:8523ec00 r4:8523ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edb8c r4:851ed800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851edb8c r4:850bd100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523ec00 r8:850bd12c r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8a46c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:343 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8523e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8a7c9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4414 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4414 tgid:4414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaea9d84 r8:00000002 r7:60000013 r6:eaea9d8c r5:85239800 r4:85239800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85239800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb6c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85239800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edf8c r4:851edc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851edf8c r4:850bd200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85239800 r8:850bd22c r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd200 r8:8027ecf4 r7:eaea5e60 r6:850c6000 r5:85239800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bb400 INFO: task kworker/0:344:4414 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8a8f5000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851a6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ee38c r4:851ee000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ee38c r4:850bd280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a6c00 r8:850bd2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd280 r8:8027ecf4 r7:eaea5e60 r6:850bd300 r5:851a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bb540 INFO: task kworker/0:345:4416 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8b28c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:346:4420 blocked for more than 466 seconds. r10:829187f4 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:851a4800 r5:851a4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7bb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eeb8c r4:851ee800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851eeb8c r4:850bd380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a4800 r8:850bd3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd380 r8:8027ecf4 r7:eaea5e60 r6:850bd400 r5:851a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bb640 INFO: task kworker/0:346:4420 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8b976000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:347:4421 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r5:851b0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbe40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea855000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef38c r4:851ef000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ef38c r4:850bd480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b0000 r8:850bd4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd480 r8:8027ecf4 r7:eaeade60 r6:850bd500 r5:851b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bb940 INFO: task kworker/0:347:4421 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8c242000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r5:80000013 r4:80239bb0 r4:e8709dc0 r4:00000000 r5:00001000 r4:e0439000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851b0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbc80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea831000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eef8c r4:851eec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851eef8c r4:850bd580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b0c00 r8:850bd5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd580 r8:8027ecf4 r7:eaeb5e60 r6:850bd600 r5:851b0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bbbc0 INFO: task kworker/0:348:4422 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8c242000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Not tainted 6.15.0-syzkaller #0 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851b1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:851b1800 r8:850bd6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd680 r8:8027ecf4 r7:eaeb5e60 r6:850bd700 r5:851b1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850bbcc0 INFO: task kworker/0:349:4425 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8cae7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:350:4427 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaec1d84 r8:00000002 r7:60000013 r6:eaec1d8c r5:851b2400 r4:851b2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bbf40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea87b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef78c r4:851ef400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ef78c r4:850bd780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b2400 r8:850bd7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd780 r8:8027ecf4 r7:eaeb9e60 r6:850bd800 r5:851b2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec1fb0 to 0xeaec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850a0b00 INFO: task kworker/0:350:4427 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8cae7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:351:4430 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r5:851b3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea971000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eff8c r4:851efc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851eff8c r4:850bd880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b3000 r8:850bd8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd880 r8:8027ecf4 r7:eaeb9e60 r6:850bd900 r5:851b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3000 INFO: task kworker/0:351:4430 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8d36d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851b3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d34c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f878c r4:851f8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f878c r4:850bd980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b3c00 r8:850bd9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bd980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bd980 r8:8027ecf4 r7:eaec5e60 r6:850bda00 r5:851b3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3000 INFO: task kworker/0:352:4431 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8d36d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:851b4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea987000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f838c r4:851f8000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f838c r4:850bda80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b4800 r8:850bdaac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bda80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bda80 r8:8027ecf4 r7:eaec9e60 r6:850bdb00 r5:851b4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d33c0 INFO: task kworker/0:353:4434 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8d9d3000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:851b5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d33c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f8b8c r4:851f8800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f8b8c r4:850bdb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b5400 r8:850bdbac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bdb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bdb80 r8:8027ecf4 r7:eaec9e60 r6:850bdc00 r5:851b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d33c0 INFO: task kworker/0:354:4435 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8e1d8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:4436 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaed9d84 r8:00000002 r7:60000013 r6:eaed9d8c r5:851b6000 r4:851b6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d38c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f8f8c r4:851f8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f8f8c r4:850bdc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b6000 r8:850bdcac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bdc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bdc80 r8:8027ecf4 r7:eaebde60 r6:850bdd00 r5:851b6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed9fb0 to 0xeaed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3600 INFO: task kworker/0:355:4436 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8e1d8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4439 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:851b6c00 r4:851b6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f938c r4:851f9000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f938c r4:850bdd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b6c00 r8:850bddac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bdd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bdd80 r8:8027ecf4 r7:eaed9e60 r6:850bde00 r5:851b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3740 INFO: task kworker/0:356:4439 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8e795000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4442 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaee1d84 r8:00000002 r7:60000113 r6:eaee1d8c r5:84778000 r4:84778000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84778000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3d00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84778000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f9b8c r4:851f9800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f9b8c r4:850bde80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84778000 r8:850bdeac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bde80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bde80 r8:8027ecf4 r7:eaed5e60 r6:850bdf00 r5:84778000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3840 INFO: task kworker/0:357:4442 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8e795000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:4443 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeddd84 r8:00000002 r7:60000013 r6:eaeddd8c r5:84778c00 r4:84778c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84778c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84778c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f978c r4:851f9400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f978c r4:850bdf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84778c00 r8:850bdfac r7:82804d40 r6:dddced40 r5:dddced60 r4:850bdf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bdf80 r8:8027ecf4 r7:eaee1e60 r6:850e1000 r5:84778c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3840 INFO: task kworker/0:358:4443 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8e9df000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4446 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaee5d84 r8:00000002 r7:60000013 r6:eaee5d8c r5:84779800 r4:84779800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84779800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3fc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84779800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fa38c r4:851fa000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fa38c r4:850e1080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84779800 r8:850e10ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1080 r8:8027ecf4 r7:eaee1e60 r6:850e1100 r5:84779800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3b80 INFO: task kworker/0:359:4446 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8f04b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4447 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:8477a400 r4:8477a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d3e40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8477a400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f9f8c r4:851f9c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851f9f8c r4:850e1180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477a400 r8:850e11ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1180 r8:8027ecf4 r7:eaee5e60 r6:850e1200 r5:8477a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850d3b80 INFO: task kworker/0:360:4447 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8f04b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85022b8c r4:85022800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:4449 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:8477b000 r4:8477b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852820c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8477b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fab8c r4:851fa800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fab8c r4:850e1280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477b000 r8:850e12ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1280 r8:8027ecf4 r7:eaee5e60 r6:850e1300 r5:8477b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85087e40 INFO: task kworker/0:361:4449 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8f04b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:4450 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:8477bc00 r4:8477bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8477bc00 r8:850e13ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1380 r8:8027ecf4 r7:eaeede60 r6:850e1400 r5:8477bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85087e40 INFO: task kworker/0:362:4450 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8f04b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:4454 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaef5d84 r8:00000002 r7:60000013 r6:eaef5d8c r5:8477c800 r4:8477c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852824c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8477c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fb38c r4:851fb000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fb38c r4:850e1480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477c800 r8:850e14ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1480 r8:8027ecf4 r7:eaeede60 r6:850e1500 r5:8477c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852821c0 INFO: task kworker/0:363:4454 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8f5bb000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:4455 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaef9d84 r8:00000002 r7:60000013 r6:eaef9d8c r5:8477d400 r4:8477d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85282280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8477d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851faf8c r4:851fac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851faf8c r4:850e1580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477d400 r8:850e15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1580 r8:8027ecf4 r7:eaef5e60 r6:850e1600 r5:8477d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852821c0 INFO: task kworker/0:364:4455 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 8fbca000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4458 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaefdd84 r8:00000002 r7:60000013 r6:eaefdd8c r5:8477e000 r4:8477e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852825c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8477e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fb78c r4:851fb400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fb78c r4:850e1680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477e000 r8:850e16ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1680 r8:8027ecf4 r7:eaef5e60 r6:850e1700 r5:8477e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85282500 INFO: task kworker/0:365:4458 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 90114000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4459 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:4459 tgid:4459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf09d84 r8:00000002 r7:60000013 r6:eaf09d8c r5:8477ec00 r4:8477ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8477ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85282940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8477ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fbf8c r4:851fbc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fbf8c r4:850e1780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477ec00 r8:850e17ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1780 r8:8027ecf4 r7:eaefde60 r6:850e1800 r5:8477ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852823c0 INFO: task kworker/0:366:4459 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 90114000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:4460 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf01d84 r8:00000002 r7:60000013 r6:eaf01d8c r5:851b8000 r4:851b8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85282780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fbb8c r4:851fb800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851fbb8c r4:850e1880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b8000 r8:850e18ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1880 r8:8027ecf4 r7:eaf09e60 r6:850e1900 r5:851b8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852823c0 INFO: task kworker/0:367:4460 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9086a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4463 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf0dd84 r8:00000002 r7:60000113 r6:eaf0dd8c r5:851b8c00 r4:851b8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85282a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520038c r4:85200000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520038c r4:850e1980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b8c00 r8:850e19ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1980 r8:8027ecf4 r7:eaf09e60 r6:850e1a00 r5:851b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852827c0 INFO: task kworker/0:368:4463 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 90c31000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4465 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf15d84 r8:00000002 r7:60000013 r6:eaf15d8c r5:851b9800 r4:851b9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85282bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520078c r4:85200400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520078c r4:850e1a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b9800 r8:850e1aac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1a80 r8:8027ecf4 r7:eaf0de60 r6:850e1b00 r5:851b9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf15fb0 to 0xeaf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85282840 INFO: task kworker/0:369:4465 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:82ac21e4 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4467 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:851bb000 r4:851bb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851bb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85201b8c r4:85201800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85201b8c r4:850e1b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d20: 91448000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:4469 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf25d84 r8:00000002 r7:60000013 r6:eaf25d8c r5:851ba400 r4:851ba400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ba400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85200b8c r4:85200800 r10:61c88647 r9:851ba400 r8:850e1cac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeaf25fb0 to 0xeaf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85282d80 INFO: task kworker/0:371:4469 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 916f1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:372 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84890000 r4:829187f0 r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84890000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf39000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85200f8c r4:85200c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85200f8c r4:850e1d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84890000 r8:850e1dac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1d80 r8:8027ecf4 r7:eaf19e60 r6:850c6080 r5:84890000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85282ec0 INFO: task kworker/0:372:4472 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 91a49000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4475 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84890c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850c6100 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:850dee00 Call trace: Exception stack(0xe8709d20 to 0xe8709d68) r5:80000013 r4:80239bb0 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:4476 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:373 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf21d84 r8:00000002 r7:60000013 r6:eaf21d8c r5:84892400 r4:84892400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84892400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84892400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf49000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520138c r4:85201000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520138c r4:850e1e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84892400 r8:850e1e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1e00 r8:8027ecf4 r7:eaf19e60 r6:850c6200 r5:84892400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528d340 INFO: task kworker/0:373:4476 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 92020000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:4480 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:4480 tgid:4480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:84893000 r4:84893000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84893000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289700 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eaf4dd84 r8:00000002 r7:60000013 r6:eaf4dd8c r5:84893c00 r5:84893c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de3c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:850c6380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6380 r8:8027ecf4 r7:eaf59e60 r6:850c6400 r5:84893c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850de600 INFO: task kworker/1:305:4481 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9264d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:4484 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf65d84 r8:00000002 r7:60000013 r6:eaf65d8c r5:84894800 r4:84894800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84894800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ab6c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84894800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526138c r4:85261000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526138c r4:850c6480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84894800 r8:850c64ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6480 r8:8027ecf4 r7:eaf59e60 r6:850c6500 r5:84894800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab640 INFO: task kworker/1:306:4484 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:4485 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf69d84 r8:00000002 r7:60000013 r6:eaf69d8c r5:84895400 r4:84895400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84895400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289140 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84895400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526178c r4:85261400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526178c r4:850c6600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84895400 r8:850c662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6600 r8:8027ecf4 r7:eaf59e60 r6:850c6580 r5:84895400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289100 INFO: task kworker/1:307:4485 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 92c66000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4487 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf75d84 r8:00000002 r7:60000013 r6:eaf75d8c r5:84891800 r4:84891800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84891800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852897c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84891800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46c1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85261f8c r4:85261c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85261f8c r4:850c6680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84891800 r8:850c66ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6680 r8:8027ecf4 r7:eaf59e60 r6:850c6700 r5:84891800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289280 INFO: task kworker/1:308:4487 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 92e6c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85022b8c r4:85022800 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:844bb800 task:kworker/0:374 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851bd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03bb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520178c r4:85201400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520178c r4:850e1e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bd400 r8:850e1eac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1e80 r8:8027ecf4 r7:eaf19e60 r6:850e1f00 r5:851bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 INFO: task kworker/0:375:4491 blocked for more than 467 seconds. r5:851bbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852887c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0329000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85202f8c r4:85202c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85202f8c r4:850e1f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bbc00 r8:850e1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:850e1f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e1f80 r8:8027ecf4 r7:eaf19e60 r6:85283000 r5:851bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf71fb0 to 0xeaf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528d880 INFO: task kworker/0:375:4491 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 936dc000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:851be000 r4:851be000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851be000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528dc40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85201f8c r4:85201c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85201f8c r4:85283080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851be000 r8:852830ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85283080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283080 r8:8027ecf4 r7:eaf71e60 r6:85283100 r5:851be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528d880 INFO: task kworker/0:376:4492 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 93a65000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf79d84 r8:00000002 r7:60000013 r6:eaf79d8c r5:851bec00 r4:851bec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851bec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e875b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:850c6780 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:4497 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:851bc800 r4:851bc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851bc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528df40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:851bc800 r8:852831ac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:4499 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf89d84 r8:00000002 r7:60000013 r6:eaf89d8c r5:851c0000 r4:851c0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850c6800 r8:8027ecf4 r7:eaf79e60 r6:85283300 r5:851c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289780 INFO: task kworker/1:310:4499 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 94e97000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:844bb800 task:kworker/0:378 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851c0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85288d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff41000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85202b8c r4:85202800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85202b8c r4:85283380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0c00 r8:852833ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85283380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283380 r8:8027ecf4 r7:eaf71e60 r6:85283400 r5:851c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528ddc0 INFO: task kworker/0:378:4501 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 950d6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:4503 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:4503 tgid:4503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:851c1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289c80 r5:85262b8c r4:85262800 r4:850c6880 Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852899c0 INFO: task kworker/1:311:4503 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 954c9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:4505 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf99d84 r8:00000002 r7:60000013 r6:eaf99d8c r5:851c3000 r4:851c3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:851c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r7:ddde2d40 r6:83018200 r5:8526338c r4:850c6900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d20: 954c9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 INFO: task kworker/1:313:4506 blocked for more than 468 seconds. r4:851c3c00 r5:851c3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289e00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac01000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85262f8c r4:85262c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85262f8c r4:850c6980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c3c00 r8:850c69ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6980 r8:8027ecf4 r7:eaf99e60 r6:85283580 r5:851c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289c00 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85022b8c r4:85022800 r4:84753f00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:314 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:851c4800 r4:851c4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac85000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85263b8c r4:85263800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85263b8c r4:850c6a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c4800 r8:850c6a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6a00 r8:8027ecf4 r7:eaf99e60 r6:85283600 r5:851c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289d00 INFO: task kworker/1:314:4509 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 95fb7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:851c5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85289a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac59000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526378c r4:85263400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526378c r4:850c6a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c5400 r8:850c6aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6a80 r8:8027ecf4 r7:eafa9e60 r6:85283680 r5:851c5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289d00 INFO: task kworker/1:315:4510 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9621e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:316:4512 blocked for more than 468 seconds. Call trace: r5:851c2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286400 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8526838c r4:850c6b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c2400 r8:850c6b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6b00 r8:8027ecf4 r7:eafa9e60 r6:85283700 r5:851c2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85289400 INFO: task kworker/1:316:4512 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 96486000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:317:4514 blocked for more than 468 seconds. r5:851c6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286040 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ab640 INFO: task kworker/1:317:4514 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 967a2000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4516 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafc5d84 r8:00000002 r7:60000113 r6:eafc5d8c r5:851c8c00 r4:851c8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:eacb7000 r5:847c4f8c r4:847c4c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c4f8c r4:850c6c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c8c00 r8:850c6c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6c00 r8:8027ecf4 r7:eafb5e60 r6:85283800 r5:851c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286180 INFO: task kworker/1:318:4516 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 967a2000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:4518 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:4518 tgid:4518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:851c8000 r4:851c8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852866c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae71000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85268b8c r4:85268800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85268b8c r4:850c6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c8000 r8:850c6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6c80 r8:8027ecf4 r7:eafb5e60 r6:85283880 r5:851c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286100 INFO: task kworker/1:319:4518 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 96b1a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:4520 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafd5d84 r8:00000002 r7:60000013 r6:eafd5d8c r5:851c9800 r4:851c9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286540 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526878c r4:85268400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526878c r4:850c6d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c9800 r8:850c6d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6d00 r8:8027ecf4 r7:eafcde60 r6:85283900 r5:851c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd5fb0 to 0xeafd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286200 INFO: task kworker/1:320:4520 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 970b6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4522 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafddd84 r8:00000002 r7:60000013 r6:eafddd8c r5:851ca400 r4:851ca400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ca400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526978c r4:85269400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526978c r4:850c6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ca400 r8:850c6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6d80 r8:8027ecf4 r7:eafcde60 r6:85283980 r5:851ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852863c0 INFO: task kworker/1:321:4522 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9722f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:851cc800 r4:829187f0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85268f8c r4:85268c00 r10:00000000 r9:850c6e00 r8:8027ecf4 r7:eafdde60 r6:85283a00 r5:851cc800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286500 INFO: task kworker/1:322:4524 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 974f8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:4526 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:851cbc00 r4:851cbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851cbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eae93000 r5:8526938c r4:85269000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:4528 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:851cb000 r4:851cb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851cb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526a38c r4:8526a000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526a38c r4:850c6f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cb000 r8:850c6f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6f00 r8:8027ecf4 r7:eafdde60 r6:85283b00 r5:851cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286600 INFO: task kworker/1:324:4528 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 97780000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:4530 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:851cd400 r4:851cd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851cd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85269b8c r4:85269800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85269b8c r4:850c6f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cd400 r8:850c6fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850c6f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c6f80 r8:8027ecf4 r7:eb001e60 r6:85283b80 r5:851cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852868c0 INFO: task kworker/1:325:4530 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 97943000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:4532 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:851ce000 r4:851ce000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ce000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85286cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85269f8c r4:85269c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85269f8c r4:850d7000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ce000 r8:850d702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7000 r8:8027ecf4 r7:eb001e60 r6:85283c00 r5:851ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286ac0 INFO: task kworker/1:326:4532 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 97d8f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:4537 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851c6c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520378c r4:85203400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520378c r4:85283c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c6c00 r8:85283cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85283c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283c80 r8:8027ecf4 r7:eaf71e60 r6:85283d00 r5:851c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85288280 INFO: task kworker/0:379:4537 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 97f7a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84896c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84896c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526af8c r4:8526ac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526af8c r4:850d7080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896c00 r8:850d70ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7080 r8:8027ecf4 r7:eb001e60 r6:850d7100 r5:84896c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286bc0 INFO: task kworker/1:327:4538 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 98207000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:4539 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:84896000 r4:84896000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84896000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84896000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526ab8c r4:8526a800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526ab8c r4:850d7180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896000 r8:850d71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7180 r8:8027ecf4 r7:eaf8de60 r6:850d7200 r5:84896000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85286bc0 INFO: task kworker/1:328:4539 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 984fe000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:4541 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb025d84 r8:00000002 r7:60000013 r6:eb025d8c r5:851cec00 r4:851cec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851cec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f13c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0581000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520338c r4:85203000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8520338c r4:85283d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cec00 r8:85283dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85283d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283d80 r8:8027ecf4 r7:eb01de60 r6:850d7280 r5:851cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1580 INFO: task kworker/0:380:4541 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 987e9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4544 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:852c1800 r4:852c1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea853000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530438c r4:85304000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530438c r4:85283e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c1800 r8:85283e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85283e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283e00 r8:8027ecf4 r7:eb01de60 r6:850d7300 r5:852c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc000 INFO: task kworker/0:381:4544 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 987e9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4545 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:85338000 r4:85338000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85338000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85338000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85203b8c r4:85203800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85203b8c r4:85283e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85338000 r8:85283eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85283e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283e80 r8:8027ecf4 r7:eb031e60 r6:85283f00 r5:85338000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead9dfb0 to 0xead9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc000 INFO: task kworker/0:382:4545 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 98baa000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4548 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:85338c00 r4:85338c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85338c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85338c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea791000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85203f8c r4:85203c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85203f8c r4:85283f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85338c00 r8:85283fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85283f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85283f80 r8:8027ecf4 r7:eb031e60 r6:850d0000 r5:85338c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc280 INFO: task kworker/0:383:4548 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 98c85000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4549 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb021d84 r8:00000002 r7:60000013 r6:eb021d8c r5:85339800 r4:85339800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85339800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85339800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7d9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841eff8c r4:841efc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841eff8c r4:850d0080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85339800 r8:850d00ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0080 r8:8027ecf4 r7:eb031e60 r6:850d0100 r5:85339800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc280 INFO: task kworker/0:384:4549 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9920d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4553 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:8533a400 r4:8533a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8a3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530478c r4:85304400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530478c r4:850d0180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533a400 r8:850d01ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0180 r8:8027ecf4 r7:eb031e60 r6:850d0200 r5:8533a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc600 INFO: task kworker/0:385:4553 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 993bb000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:4554 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:8533b000 r4:8533b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ccc00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea981000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85304f8c r4:85304c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85304f8c r4:850d0280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533b000 r8:850d02ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0280 r8:8027ecf4 r7:eb039e60 r6:850d0300 r5:8533b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc680 INFO: task kworker/0:386:4554 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9987b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4555 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:8533bc00 r4:8533bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cca40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea963000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85304b8c r4:85304800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85304b8c r4:850d0380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533bc00 r8:850d03ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0380 r8:8027ecf4 r7:eb049e60 r6:850d0400 r5:8533bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cc680 INFO: task kworker/0:387:4555 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9987b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4558 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb04dd84 r8:00000002 r7:60000013 r6:eb04dd8c r5:8533c800 r4:8533c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528d600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85305b8c r4:85305800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85305b8c r4:850d0480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533c800 r8:850d04ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0480 r8:8027ecf4 r7:eb049e60 r6:850d0500 r5:8533c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850cca80 INFO: task kworker/0:388:4558 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 99e7c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:4560 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb055d84 r8:00000002 r7:60000013 r6:eb055d8c r5:8533d400 r4:8533d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ccd40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8533d400 r8:850d05ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0580 r8:8027ecf4 r7:eb04de60 r6:850d0600 r5:8533d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ccbc0 INFO: task kworker/0:389:4560 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9a26e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:4562 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb05dd84 r8:00000002 r7:60000013 r6:eb05dd8c r5:8533e000 r4:8533e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cce80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533e000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530578c r4:85305400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530578c r4:850d0680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533e000 r8:850d06ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0680 r8:8027ecf4 r7:eb04de60 r6:850d0700 r5:8533e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ccd00 INFO: task kworker/0:390:4562 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9a643000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4564 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:8533ec00 r4:8533ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530638c r4:85306000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530638c r4:850d0780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533ec00 r8:850d07ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753f00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:392 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb065d84 r8:00000002 r7:60000013 r6:eb065d8c r5:84980000 r4:84980000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84980000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85282d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84980000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85305f8c r4:85305c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85305f8c r4:850d0880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84980000 r8:850d08ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0880 r8:8027ecf4 r7:eb061e60 r6:850d0900 r5:84980000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290000 INFO: task kworker/0:392:4566 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9afaa000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:84980c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84980c00 r8:850d09ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0980 r8:8027ecf4 r7:eb061e60 r6:850d0a00 r5:84980c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290300 INFO: task kworker/0:393:4568 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9b5bf000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/0:394:4570 blocked for more than 469 seconds. r4:84981800 r5:84981800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290480 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290400 INFO: task kworker/0:394:4570 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9bbce000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe8709fb0 to 0xe8709ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4572 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4572 tgid:4572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:852c0c00 r4:852c0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290680 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85306f8c r4:85306c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85306f8c r4:850d0b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0c00 r8:850d0bac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0b80 r8:8027ecf4 r7:eb06de60 r6:850d7380 r5:852c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290200 INFO: task kworker/0:395:4572 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9bbce000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4574 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb089d84 r8:00000002 r7:60000013 r6:eb089d8c r5:852c3000 r4:852c3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8530cb8c r4:850d0c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4575 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb08dd84 r8:00000002 r7:60000113 r6:eb08dd8c r5:852c3c00 r4:852c3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:852c3c00 r8:850d0cac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9c4c7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4577 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:852c0000 r5:852c0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530778c r4:85307400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530778c r4:850d0d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0000 r8:850d0d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0d00 r8:8027ecf4 r7:eb089e60 r6:850d7500 r5:852c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 r5:00001000 r4:e0439000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:4579 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:852c5400 r4:852c5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850d0d80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290700 INFO: task kworker/0:399:4579 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:00000000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:852c4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:eadf1000 r10:00000000 r9:850d0e00 r8:8027ecf4 r7:eb089e60 r6:850d7600 r5:852c4800 Exception stack(0xe8709d20 to 0xe8709d68) r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852c2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:eae09000 r10:00000000 r9:850d0e80 r8:8027ecf4 r7:eb089e60 r6:850d7680 r5:852c2400 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 Exception stack(0xe8709fb0 to 0xe8709ff8) r4:852c6000 r5:852c6000 r4:829187f0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eae99000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530c78c r4:8530c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530c78c r4:850d0f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c6000 r8:850d0f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0f00 r8:8027ecf4 r7:eb089e60 r6:850d7700 r5:852c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290b40 INFO: task kworker/0:402:4585 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9da2e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:852c6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85288f40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf27000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530cf8c r4:8530cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530cf8c r4:850d0f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c6c00 r8:850d0fac r7:82804d40 r6:dddced40 r5:dddced60 r4:850d0f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d0f80 r8:8027ecf4 r7:eb089e60 r6:850d7780 r5:852c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85290d80 INFO: task kworker/0:403:4587 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9dbde000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:852c8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530db8c r4:8530d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530db8c r4:852a1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8c00 r8:852a102c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a1000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1000 r8:8027ecf4 r7:eb0d9e60 r6:850d7800 r5:852c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85288a40 INFO: task kworker/0:404:4590 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9e181000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:4591 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:852c9800 r5:852c9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eaf35000 Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:eaf3f000 r4:00000001 r4:852a4100 INFO: task kworker/0:406:4593 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9e542000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r4:852cbc00 r5:852cbc00 r4:829187f0 r4:00000000 r9:83018005 r8:852cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb105d84 r8:00000002 r7:60000113 r6:eb105d8c r5:852cc800 r4:852cc800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852cc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a4240 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r7:dddced40 r6:83018000 r5:8530e38c r4:852a1280 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:4605 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eaffdd84 r8:00000002 r7:60000013 r6:eaffdd8c r5:852cec00 r5:852cec00 r4:829187f0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8526b38c r4:850d7b00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac21e4 r5:00001000 r4:e0439000 9fa0: 00000000 00000000 00000000 00000000 r5:852cd400 r4:829187f0 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4607 blocked for more than 470 seconds. r4:84983000 r5:84983000 r4:829187f0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852a4680 INFO: task kworker/0:411:4607 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: 9fab0000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000001 task:kworker/1:330 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0439000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84985400 r4:829187f0 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aaf00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84985400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04db000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526bb8c r4:8526b800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526bb8c r4:850d7d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84985400 r8:850d7d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7d00 r8:8027ecf4 r7:eb051e60 r6:852a1500 r5:84985400 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe8709d20 to 0xe8709d68) r4:e8709dc0 r4:00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84986000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852a4900 INFO: task kworker/0:412:4613 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a0161000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84986c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84986c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85290fc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84986c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea92b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c538c r4:847c5000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c538c r4:850d7d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84986c00 r8:850d7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb11dfb0 to 0xeb11dff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:00000000 r5:85022b8c r4:85022800 r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:4617 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb119d84 r8:00000002 r7:60000013 r6:eb119d8c r5:84983c00 r4:84983c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84983c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aa440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84983c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea781000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526bf8c r4:8526bc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526bf8c r4:850d7e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983c00 r8:850d7e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7e00 r8:8027ecf4 r7:eb11de60 r6:852a1700 r5:84983c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852aaf40 INFO: task kworker/1:333:4617 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a0333000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 r5:85022b8c r4:85022800 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84982400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:841d838c r4:841d8000 r4:852a1780 Exception stack(0xeb125fb0 to 0xeb125ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852a4b40 INFO: task kworker/0:413:4620 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a077e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:334 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8523c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 r5:00001000 r4:eabe1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527438c r4:85274000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527438c r4:850d7e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523c800 r8:850d7eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7e80 r8:8027ecf4 r7:eb11de60 r6:852a1880 r5:8523c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852aa200 INFO: task kworker/1:334:4621 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a09e1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) INFO: task kworker/1:335:4623 blocked for more than 470 seconds. r5:85340000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7480 r7:ddde2d40 r6:83018200 r5:85274b8c r4:850d7f00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b7100 INFO: task kworker/1:335:4623 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a0a69000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85340c00 r5:85340c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85340c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac19000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527478c r4:85274400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527478c r4:850d7f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85340c00 r8:850d7fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850d7f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d7f80 r8:8027ecf4 r7:eb12de60 r6:852a1980 r5:85340c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b71c0 INFO: task kworker/1:336:4625 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a0c47000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85341800 r5:85341800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85341800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac91000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85274f8c r4:85274c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85274f8c r4:852b8000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85341800 r8:852b802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8000 r8:8027ecf4 r7:eb12de60 r6:852a1a00 r5:85341800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b7300 INFO: task kworker/1:337:4627 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 r4:e8709dc0 r4:00000000 r5:85022b8c r4:85022800 r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:338:4629 blocked for more than 470 seconds. r10:829187f4 r9:eb139d84 r8:00000002 r7:60000013 r6:eb139d8c r5:85342400 r5:85342400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85342400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae65000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527578c r4:85275400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527578c r4:852b8080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85342400 r8:852b80ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8080 r8:8027ecf4 r7:eb135e60 r6:852a1a80 r5:85342400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b74c0 INFO: task kworker/1:338:4629 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1320000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85343000 r5:85343000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527538c r4:85275000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527538c r4:852b8100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85343000 r8:852b812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8100 r8:8027ecf4 r7:eb139e60 r6:852a1b00 r5:85343000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b7280 INFO: task kworker/1:339:4630 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1320000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4634 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85343c00 r5:85343c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b5880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85343c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530f78c r4:8530f400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530f78c r4:852a1b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85343c00 r8:852a1bac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a1b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1b80 r8:8027ecf4 r7:eb125e60 r6:852a1c00 r5:85343c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852aaec0 INFO: task kworker/0:414:4634 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a150d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:4635 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:85344800 r4:85344800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85344800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85344800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85275b8c r4:85275800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85275b8c r4:852b8180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85344800 r8:852b81ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8180 r8:8027ecf4 r7:eb139e60 r6:852a1c80 r5:85344800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b77c0 INFO: task kworker/1:340:4635 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1710000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:4637 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb14dd84 r8:00000002 r7:60000013 r6:eb14dd8c r5:85346000 r4:85346000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85346000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85346000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527638c r4:85276000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527638c r4:852b8200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85346000 r8:852b822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8200 r8:8027ecf4 r7:eb145e60 r6:852a1d00 r5:85346000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b7b40 INFO: task kworker/1:341:4637 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1a3a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4640 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb159d84 r8:00000002 r7:60000113 r6:eb159d8c r5:85348c00 r4:85348c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85348c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eae8b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1afe000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:4642 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:4642 tgid:4642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb161d84 r8:00000002 r7:60000013 r6:eb161d8c r5:8534a400 r4:8534a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7e00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527678c r4:85276400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527678c r4:852b8380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534a400 r8:852b83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8380 r8:8027ecf4 r7:eb14de60 r6:852a1e00 r5:8534a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b7c80 INFO: task kworker/1:343:4642 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1afe000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4643 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:852d1800 r4:852d1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b73c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85276f8c r4:85276c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85276f8c r4:852b8300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d1800 r8:852b832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8300 r8:8027ecf4 r7:eb161e60 r6:852b8400 r5:852d1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b7c80 INFO: task kworker/1:344:4643 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a1efb000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85022b8c r4:85022800 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:345:4645 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:345 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:852d0c00 r4:852d0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b7ec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852b8480 r8:8027ecf4 r7:eb141e60 r6:852b8500 r5:852d0c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4647 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:852d3000 r4:852d3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 80000013 ffffffff r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4649 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb169d84 r8:00000002 r7:60000013 r6:eb169d8c r5:852d3c00 r4:852d3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b14c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0df000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527778c r4:85277400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527778c r4:852b8680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d3c00 r8:852b86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8680 r8:8027ecf4 r7:eb149e60 r6:852b8700 r5:852d3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1180 INFO: task kworker/1:347:4649 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a2336000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4652 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb175d84 r8:00000002 r7:60000013 r6:eb175d8c r5:852d5400 r4:852d5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528f040 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8530ff8c r4:852a1e80 r4:852a1e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a1e80 r8:8027ecf4 r7:eb125e60 r6:852b8780 r5:852d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b5700 INFO: task kworker/0:415:4652 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a2757000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 r4:852d4800 r5:852d4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277b8c r4:85277800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85277b8c r4:852b8800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d4800 r8:852b882c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8800 r8:8027ecf4 r7:eb169e60 r6:852a1f00 r5:852d4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1280 INFO: task kworker/1:348:4653 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a2d94000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8534b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1ac0 r9:83018205 r8:8534b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a878c r4:853a8400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a878c r4:852b8880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534b000 r8:852b88ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8880 r8:8027ecf4 r7:eb179e60 r6:852a1f80 r5:8534b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b12c0 INFO: task kworker/1:349:4655 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a30a4000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:4657 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb18dd84 r8:00000002 r7:60000113 r6:eb18dd8c r5:85349800 r4:85349800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85349800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85349800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb183000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277f8c r4:85277c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85277f8c r4:852b8900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85349800 r8:852b892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8900 r8:8027ecf4 r7:eb15de60 r6:852a5000 r5:85349800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b16c0 INFO: task kworker/1:350:4657 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a35c6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8534c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a838c r4:853a8000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a838c r4:852b8980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534c800 r8:852b89ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8980 r8:8027ecf4 r7:eb15de60 r6:852a5080 r5:8534c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1780 INFO: task kworker/1:351:4659 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4661 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1b5d84 r8:00000002 r7:60000013 r6:eb1b5d8c r5:8534bc00 r4:8534bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8534bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1bc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ab000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8534ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aa38c r4:853aa000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853aa38c r4:852b8a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534ec00 r8:852b8aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8a80 r8:8027ecf4 r7:eb1b5e60 r6:852a5180 r5:8534ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1c00 INFO: task kworker/1:353:4663 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a3d5d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8534d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a8f8c r4:853a8c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a8f8c r4:852b8b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534d400 r8:852b8b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8b00 r8:8027ecf4 r7:eb1c1e60 r6:852a5200 r5:8534d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1c00 INFO: task kworker/1:354:4664 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a42b7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r4:82ac21e4 r4:e8709dc0 r4:00000000 r5:00001000 r4:e0439000 r4:84753f00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:85345400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85345400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a938c r4:853a9000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a938c r4:852b8b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85345400 r8:852b8bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8b80 r8:8027ecf4 r7:eb1c1e60 r6:852a5280 r5:85345400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1a40 INFO: task kworker/1:355:4667 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a44b9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) r4:844bb800 Not tainted 6.15.0-syzkaller #0 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8534e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1f40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8534e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a978c r4:853a9400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a978c r4:852b8c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534e000 r8:852b8c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8c00 r8:8027ecf4 r7:eb1c1e60 r6:852a5300 r5:8534e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852b1d00 INFO: task kworker/1:356:4668 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a4c28000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4670 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:85346c00 r4:85346c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85346c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85346c00 r8:852b8cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a4e22000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4672 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:849f0c00 r5:849f0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d300 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a9f8c r4:853a9c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a9f8c r4:852b8d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0c00 r8:852b8d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8d00 r8:8027ecf4 r7:eb1c1e60 r6:852a5400 r5:849f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8529d000 INFO: task kworker/1:358:4672 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a5532000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:852d6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528f500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532038c r4:85320000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532038c r4:852a5480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d6c00 r8:852a54ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5480 r8:8027ecf4 r7:eb125e60 r6:852b8d80 r5:852d6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528f200 INFO: task kworker/0:416:4677 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a5b95000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:4678 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:852d6000 r4:852d6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb2a3000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4679 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:852d2400 r4:852d2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85369a40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf45000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aa78c r4:853aa400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853aa78c r4:852b8f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d2400 r8:852b8f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852b8f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b8f00 r8:8027ecf4 r7:eb199e60 r6:852b8f80 r5:852d2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8529d3c0 INFO: task kworker/1:360:4679 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a6272000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e0439000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe8709fb0 to 0xe8709ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:852d0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528f600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0663000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532078c r4:85320400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532078c r4:852a5500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0000 r8:852a552c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5500 r8:8027ecf4 r7:eb1fde60 r6:85297000 r5:852d0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528f540 INFO: task kworker/0:417:4682 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:852c8000 r5:852c8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852c8000 r8:852a55ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb085fb0 to 0xeb085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528f340 INFO: task kworker/0:418:4684 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a6aca000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852d8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:852d8000 r8:852a562c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e8709dc0 r5:00001000 r4:e0439000 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Workqueue: events bpf_prog_free_deferred r5:852d9800 r4:829187f0 r4:00000000 r4:00000000 r5:00001000 r4:ea97b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532178c r4:85321400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532178c r4:852a5680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d9800 r8:852a56ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5680 r8:8027ecf4 r7:eb0a5e60 r6:85297180 r5:852d9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb211fb0 to 0xeb211ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528f700 INFO: task kworker/0:420:4688 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a6dd3000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:421 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852db000 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:85022b8c r4:85022800 r4:00000001 r4:844bb800 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852da400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528fc80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852da400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ab000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85321b8c r4:85321800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85321b8c r4:852a5780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852da400 r8:852a57ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5780 r8:8027ecf4 r7:eb211e60 r6:85297280 r5:852da400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe8709d20 to 0xe8709d68) r4:e8709dc0 r5:00001000 r4:e0439000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:423:4696 blocked for more than 471 seconds. r5:852d8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:852d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8528fa80 INFO: task kworker/0:423:4696 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a7a1c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:852dc800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8532238c r4:85322000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:4698 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:852dbc00 r4:852dbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r7:dddced40 r6:83018000 r5:85322b8c r4:852a5900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:85022b8c r4:85022800 Exception stack(0xe8709fb0 to 0xe8709ff8) task:kworker/0:426 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852dec00 r4:829187f0 r4:00000000 r9:83018005 r8:852dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r4:852a5980 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac21e4 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:4701 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb245d84 r8:00000002 r7:60000113 r6:eb245d8c r5:852dd400 r4:852dd400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadef000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85323b8c r4:85323800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85323b8c r4:852a5a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dd400 r8:852a5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5a00 r8:8027ecf4 r7:eb239e60 r6:85297500 r5:852dd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847f1340 INFO: task kworker/0:427:4701 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a9180000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:428 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852de000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852de000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead13000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85322f8c r4:85322c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85322f8c r4:852a5a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852de000 r8:852a5aac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5a80 r8:8027ecf4 r7:eb245e60 r6:85297580 r5:852de000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852ae000 INFO: task kworker/0:428:4703 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a9180000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852e0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae2c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead61000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532338c r4:85323000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532338c r4:852a5b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e0c00 r8:852a5b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5b00 r8:8027ecf4 r7:eb245e60 r6:85297600 r5:852e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852ae200 INFO: task kworker/0:429:4705 is blocked on a mutex likely owned by task kworker/0:153:3780. 9d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:430:4707 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r5:852e0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r5:00001000 r4:eada1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852a5b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5b80 r8:8027ecf4 r7:eb245e60 r6:85297680 r5:852e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852ae300 INFO: task kworker/0:430:4707 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a997f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:844bb800 task:kworker/0:431 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852e1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:431:4710 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: a9cfb000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:852e2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85323f8c r4:852a5c80 r4:852ae380 Exception stack(0xe8709d20 to 0xe8709d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:433:4713 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4713 tgid:4713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb275d84 r8:00000002 r7:60000013 r6:eb275d8c r5:852e3000 r4:852e3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae7c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532438c r4:85324000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532438c r4:852a5d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3000 r8:852a5d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5d00 r8:8027ecf4 r7:eb269e60 r6:85297800 r5:852e3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852ae700 INFO: task kworker/0:433:4713 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: aa1e9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4715 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852e3c00 r5:852e3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8532478c r4:85324400 r10:61c88647 r9:852e3c00 r8:852a5eac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852ae5c0 INFO: task kworker/0:434:4715 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: aa82f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:00001000 r4:e0439000 r4:84753f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:852e4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:852e4800 r8:852a5e2c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:849f3000 r4:829187f0 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aed80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85324f8c r4:85324c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85324f8c r4:852a5d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f3000 r8:852a5dac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a5d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5d80 r8:8027ecf4 r7:eb269e60 r6:852a5f00 r5:849f3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852ae900 INFO: task kworker/0:436:4719 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:80000013 r4:80239bb0 r4:00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:844bb800 Workqueue: events bpf_prog_free_deferred r5:849f1800 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:4724 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb28dd84 r8:00000002 r7:60000113 r6:eb28dd8c r5:849f4800 r4:849f4800 r5:849f4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:eb0f7000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:438 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849f5400 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb095fb0 to 0xeb095ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ab3f1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:4728 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:849f6c00 r5:849f6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8528f0c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:852aecc0 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:849f2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b200 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85325f8c r4:85325c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85325f8c r4:85373300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f2400 r8:8537332c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373300 r8:8027ecf4 r7:eb28de60 r6:85373380 r5:849f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8529dac0 INFO: task kworker/0:440:4730 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ab8a5000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e0439000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4733 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4733 tgid:4733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:849f0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85326f8c r4:85373400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:362:4734 blocked for more than 472 seconds. r5:852e6000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bcb80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abf8c r4:853abc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853abf8c r4:85297a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e6000 r8:85297a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85297a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85297a00 r8:8027ecf4 r7:eb199e60 r6:85297a80 r5:852e6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85369a80 INFO: task kworker/1:362:4734 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe8709d20 to 0xe8709d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:844bb800 task:kworker/0:442 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852e6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:852e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r4:00000001 r4:8536b400 INFO: task kworker/0:442:4735 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ac114000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:363 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852e5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85374e80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r7:ddde2d40 r6:83018200 r5:853ab78c r4:85297b80 Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) INFO: task kworker/1:363:4737 is blocked on a mutex likely owned by task kworker/0:153:3780. 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:00001000 r4:e0439000 r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4739 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:852cb000 r4:852cb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852cb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85326b8c r4:85373580 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536b700 INFO: task kworker/0:443:4739 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ac628000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:852e8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536bb80 r4:85373600 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:4743 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb189d84 r8:00000002 r7:60000013 r6:eb189d8c r5:852e8c00 r4:852e8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ba40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532738c r4:85327000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532738c r4:85373680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8c00 r8:853736ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373680 r8:8027ecf4 r7:eb151e60 r6:85297d80 r5:852e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536b980 INFO: task kworker/0:445:4743 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: acae7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4746 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1a9d84 r8:00000002 r7:60000013 r6:eb1a9d8c r5:852e9800 r4:852e9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536be80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0503000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85327f8c r4:85327c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85327f8c r4:85373700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e9800 r8:8537372c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373700 r8:8027ecf4 r7:eb151e60 r6:85297e00 r5:852e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536ba00 INFO: task kworker/0:446:4746 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: acae7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4748 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1a5d84 r8:00000002 r7:60000113 r6:eb1a5d8c r5:852eb000 r4:852eb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852eb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536bd80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85327b8c r4:85327800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85327b8c r4:85373780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eb000 r8:853737ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373780 r8:8027ecf4 r7:eb1a9e60 r6:85297e80 r5:852eb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536bb40 INFO: task kworker/0:447:4748 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ad09e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4750 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1b1d84 r8:00000002 r7:60000013 r6:eb1b1d8c r5:852ebc00 r4:852ebc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ebc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa09000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532c78c r4:8532c400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532c78c r4:85373800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ebc00 r8:8537382c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373800 r8:8027ecf4 r7:eb1a9e60 r6:85297f00 r5:852ebc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536bcc0 INFO: task kworker/0:448:4750 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ad389000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4752 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:852ec800 r4:852ec800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ec800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e876f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532c38c r4:8532c000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532c38c r4:85373880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ec800 r8:853738ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373880 r8:8027ecf4 r7:eb1b1e60 r6:85297f80 r5:852ec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536bf80 INFO: task kworker/0:449:4752 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ad6f9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4755 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:852ed400 r4:852ed400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ed400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ed80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532f38c r4:8532f000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532f38c r4:85373900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ed400 r8:8537392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373900 r8:8027ecf4 r7:eb1b1e60 r6:85376000 r5:852ed400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8529dac0 INFO: task kworker/0:450:4755 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ad96a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4756 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4756 tgid:4756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:852eec00 r4:852eec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852eec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b1f80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532cb8c r4:8532c800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532cb8c r4:85373980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eec00 r8:853739ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373980 r8:8027ecf4 r7:eb1e9e60 r6:85376080 r5:852eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536bd00 INFO: task kworker/0:451:4756 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: adb77000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:4758 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:852ee000 r5:852ee000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e040 r5:00001000 r4:eac55000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532cf8c r4:8532cc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532cf8c r4:85373a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ee000 r8:85373a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373a00 r8:8027ecf4 r7:eb1e9e60 r6:85376100 r5:852ee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85369140 INFO: task kworker/0:452:4758 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: add6a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:453 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852f0c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e2c0 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac93000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532d38c r4:8532d000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532d38c r4:85373a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f0c00 r8:85373aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373a80 r8:8027ecf4 r7:eb1e9e60 r6:85376180 r5:852f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536e080 INFO: task kworker/0:453:4760 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ae179000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e8709dc0 r4:00000000 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85022b8c r4:85022800 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:4762 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:4762 tgid:4762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2ddd84 r8:00000002 r7:60000113 r6:eb2ddd8c r5:852f0000 r4:852f0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e400 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532d78c r4:8532d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532d78c r4:85373b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f0000 r8:85373b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373b00 r8:8027ecf4 r7:eb1e9e60 r6:85376200 r5:852f0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536e140 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4764 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:852f2400 r4:852f2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532db8c r4:8532d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532db8c r4:85373b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f2400 r8:85373bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373b80 r8:8027ecf4 r7:eb1e9e60 r6:85376280 r5:852f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536e4c0 INFO: task kworker/0:455:4764 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ae70a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:844bb800 r5:852f3c00 r4:829187f0 r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532df8c r4:8532dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532df8c r4:85373c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3c00 r8:85373c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373c00 r8:8027ecf4 r7:eb1e9e60 r6:85376300 r5:852f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/0:456:4766 is blocked on a mutex likely owned by task kworker/0:153:3780. 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:457 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852f5400 r4:829187f0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85373c80 r8:8027ecf4 r7:eb1e9e60 r6:85376380 r5:852f5400 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:4770 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:852f6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85373d00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 r5:852f4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ea80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532eb8c r4:8532e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532eb8c r4:85373d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f4800 r8:85373dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85373d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373d80 r8:8027ecf4 r7:eb1e9e60 r6:85376480 r5:852f4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb301fb0 to 0xeb301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536e740 INFO: task kworker/0:459:4772 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: af645000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:4775 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb309d84 r8:00000002 r7:60000113 r6:eb309d8c r5:852f6c00 r4:852f6c00 r5:852f6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532ef8c r4:8532ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532ef8c r4:85373e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6c00 r8:85373e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373e00 r8:8027ecf4 r7:eb1e9e60 r6:85376500 r5:852f6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:852f3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ee80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:e8709dc0 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:4779 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:852f1800 r4:852f1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb185000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e438c r4:853e4000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e438c r4:85373f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f1800 r8:85373f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85373f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85373f00 r8:8027ecf4 r7:eb30de60 r6:85376600 r5:852f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8536ec80 INFO: task kworker/0:462:4779 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d20: afb82000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:463:4781 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb319d84 r8:00000002 r7:60000013 r6:eb319d8c r5:853e8000 r4:853e8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536b480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8532fb8c r4:8532f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8532fb8c r4:85373f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849f3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:464:4782 is blocked on a mutex likely owned by task kworker/0:153:3780. 9d60: 80000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:4786 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:4786 tgid:4786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:849f6000 r4:849f6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849f6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e478c r4:853e4400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e478c r4:85387100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f6000 r8:8538712c r7:82804d40 r6:dddced40 r5:dddced60 r4:85387100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387100 r8:8027ecf4 r7:eb311e60 r6:85387180 r5:849f6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853891c0 INFO: task kworker/0:465:4786 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:85348000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85348000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e4b8c r4:853e4800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e4b8c r4:85387200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348000 r8:8538722c r7:82804d40 r6:dddced40 r5:dddced60 r4:85387200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387200 r8:8027ecf4 r7:eb315e60 r6:85387280 r5:85348000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853891c0 INFO: task kworker/0:466:4787 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b04db000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84830c00 r5:84830c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e538c r4:853e5000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85387300 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Not tainted 6.15.0-syzkaller #0 r5:84831800 r4:829187f0 r4:00000000 r9:83018005 r8:84831800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:00000000 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4793 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:84830000 r4:84830000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb3c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84830000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c5b8c r4:847c5800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c5b8c r4:85376700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:8537672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85376700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85376700 r8:8027ecf4 r7:ead35e60 r6:85387500 r5:84830000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:364:4793 is blocked on a mutex likely owned by task kworker/0:153:3780. r4:e8709dc0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:844bb800 Workqueue: events bpf_prog_free_deferred r5:84833000 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:853e5f8c r4:85387580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:853875ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85387580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387580 r8:8027ecf4 r7:eb325e60 r6:85387600 r5:84833000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85389780 INFO: task kworker/0:469:4795 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b0f0a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84833c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853e578c r4:853e5400 r10:00000000 r9:85387680 r8:8027ecf4 r7:eb329e60 r6:85387700 r5:84833c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85389780 INFO: task kworker/0:470:4796 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b13d1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:84753f00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84834800 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4801 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:84835400 r4:84835400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84835400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85389f40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84835400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:853e638c r4:85387880 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb36dd84 r8:00000002 r7:60000113 r6:eb36dd8c r5:84836000 r4:84836000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84836000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85374280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84836000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb375000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e678c r4:853e6400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e678c r4:85387980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836000 r8:853879ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85387980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387980 r8:8027ecf4 r7:eb361e60 r6:85387a00 r5:84836000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85374600 INFO: task kworker/0:473:4804 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b1baf000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:474 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84836c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397040 r7:dddced40 r6:83018000 r5:853e6b8c r4:85387a80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85389f00 INFO: task kworker/0:474:4805 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b1e25000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4808 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb385d84 r8:00000002 r7:60000113 r6:eb385d8c r5:84832400 r4:84832400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84832400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e6f8c r4:853e6c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e6f8c r4:85387b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:85387bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85387b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387b80 r8:8027ecf4 r7:eb379e60 r6:85387c00 r5:84832400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb385fb0 to 0xeb385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853971c0 INFO: task kworker/0:475:4808 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b213a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 r4:e8709dc0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:85458000 r4:85458000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85458000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853974c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85458000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff35000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e738c r4:853e7000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e738c r4:85387c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458000 r8:85387cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85387c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387c80 r8:8027ecf4 r7:eb385e60 r6:85387d00 r5:85458000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853971c0 INFO: task kworker/0:476:4809 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b213a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85022b8c r4:85022800 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4812 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:85458c00 r4:85458c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85458c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85458c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0381000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e778c r4:853e7400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853e778c r4:85387d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458c00 r8:85387dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85387d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387d80 r8:8027ecf4 r7:eb355e60 r6:85387e00 r5:85458c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85397340 INFO: task kworker/0:477:4812 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b267e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4814 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:85459800 r4:85459800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85459800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853e7b8c r4:853e7800 r10:00000000 r9:85387e80 r8:8027ecf4 r7:eb391e60 r6:85387f00 r5:85459800 INFO: task kworker/0:478:4814 is blocked on a mutex likely owned by task kworker/0:153:3780. 9d60: 80000013 ffffffff r4:e8709dc0 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4816 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb39dd84 r8:00000002 r7:60000113 r6:eb39dd8c r5:8545a400 r5:8545a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:853e7f8c r4:853e7c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85397580 INFO: task kworker/0:479:4816 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b2a04000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:480 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8545b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8545b000 r8:853a70ac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe8709d20 to 0xe8709d68) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4820 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8545bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8545bc00 r8:853a71ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a7180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a7180 r8:8027ecf4 r7:eb215e60 r6:853a7200 r5:8545bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85397880 INFO: task kworker/0:481:4820 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 9d60: 80000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:844bb800 Workqueue: events bpf_prog_free_deferred r5:8545c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b0c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542978c r4:85429400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542978c r4:853a7280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545c800 r8:853a72ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a7280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a7280 r8:8027ecf4 r7:eb229e60 r6:853a7300 r5:8545c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r4:e8709dc0 r5:85022b8c r4:85022800 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4824 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:8545d400 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:483:4824 is blocked on a mutex likely owned by task kworker/0:153:3780. r4:e8709dc0 r5:85022b8c r4:85022800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4826 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8545e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 r5:8545ec00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:dddced40 r6:83018000 r5:8542938c r4:853a7580 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8529df40 INFO: task kworker/0:485:4827 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Not tainted 6.15.0-syzkaller #0 r5:84490000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d20: b3a98000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:84490c00 r4:84490c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84490c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b540 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r10:61c88647 r9:84490c00 r8:853a77ac r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000001 INFO: task kworker/0:488:4834 blocked for more than 473 seconds. task:kworker/0:488 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:84491800 r4:84491800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84491800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b680 r4:00000000 r5:00001000 r4:eade3000 r4:00000001 Workqueue: events bpf_prog_free_deferred [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:84492400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r7:dddced40 r6:83018000 r5:8542af8c r4:853a7a00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b4406000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549b8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84493000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadff000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84493000 r8:853a7b2c r7:82804d40 r6:dddced40 r5:dddced60 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:4841 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r7:dddced40 r6:83018000 r5:8542b38c r4:853a7c00 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:853ec800 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb033000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8549b900 INFO: task kworker/0:492:4842 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b4a8c000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 INFO: task kworker/0:493:4843 blocked for more than 473 seconds. [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r5:00001000 r4:eaf43000 r10:61c88647 r9:84493c00 r8:853a7d2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4845 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8542bb8c r4:8542b800 r4:853a7e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b5070000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84753f00 r4:844bb800 Workqueue: events bpf_prog_free_deferred [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ab140 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8549bd80 INFO: task kworker/0:495:4849 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b5305000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:844bb800 Call trace: [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549bf40 r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 Exception stack(0xe8709fb0 to 0xe8709ff8) Call trace: [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ab480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84496c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85430f8c r4:85430c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85430f8c r4:854b2100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84496c00 r8:854b212c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2100 r8:8027ecf4 r7:eb3d9e60 r6:854b2180 r5:84496c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 9d20: b5526000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ab280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0db000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85430b8c r4:85430800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85430b8c r4:854b2200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0000 r8:854b222c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2200 r8:8027ecf4 r7:eb3e1e60 r6:854b2280 r5:849e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ab1c0 INFO: task kworker/0:498:4854 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:499:4856 blocked for more than 474 seconds. r4:849e0c00 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb22d000 r4:854b2300 Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ab300 INFO: task kworker/0:499:4856 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b5ec4000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:849e1800 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ab780 r7:dddced40 r6:83018000 r5:8543178c r4:854b2400 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:4860 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:4860 tgid:4860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:849e2400 r4:849e2400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e2400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854abac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849e2400 r8:854b252c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b63d8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:849e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced40 r6:83018000 r5:85431b8c r4:854b2600 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b63d8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb2bd000 r7:dddced40 r6:83018000 r5:8543238c r4:854b2700 r4:854b2700 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ab940 INFO: task kworker/0:503:4864 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b694a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb401d84 r8:00000002 r7:60000013 r6:eb401d8c r5:849e4800 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e4800 r8:854b282c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2800 r8:8027ecf4 r7:eb3fde60 r6:854b2880 r5:849e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854aba40 INFO: task kworker/0:504:4867 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b694a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Not tainted 6.15.0-syzkaller #0 r4:849e5400 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb399000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543278c r4:85432400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8543278c r4:854b2900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e5400 r8:854b292c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2900 r8:8027ecf4 r7:eb401e60 r6:854b2980 r5:849e5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854abb40 INFO: task kworker/0:505:4868 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b6cfc000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4869 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3e5d84 r8:00000002 r7:60000013 r6:eb3e5d8c r5:849e6000 r4:849e6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eb40d000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:4873 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:849e6c00 r4:849e6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854b2b00 r8:8027ecf4 r7:eb401e60 r6:854b2b80 r5:849e6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca000 INFO: task kworker/0:507:4873 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7211000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85022b8c r4:85022800 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) r4:844bb800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb429d84 r8:00000002 r7:60000013 r6:eb429d8c r5:85470000 r4:85470000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85470000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ca500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85470000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85433b8c r4:85433800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85433b8c r4:854b2c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85470000 r8:854b2c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2c00 r8:8027ecf4 r7:eb401e60 r6:854b2c80 r5:85470000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca240 INFO: task kworker/0:508:4874 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7211000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4876 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:85470c00 r4:85470c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85470c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:eb431000 r7:dddced40 r6:83018000 r5:8543378c r4:854b2d00 r10:00000000 r9:854b2d00 r8:8027ecf4 r7:eb429e60 r6:854b2d80 r5:85470c00 r4:854ca240 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4879 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb441d84 r8:00000002 r7:60000113 r6:eb441d8c r5:85471800 r4:85471800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85471800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ca640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85471800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb449000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85433f8c r4:85433c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85433f8c r4:854b2e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85471800 r8:854b2e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2e00 r8:8027ecf4 r7:eb429e60 r6:854b2e80 r5:85471800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca380 INFO: task kworker/0:510:4879 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7a15000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb499000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:854b2f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2f00 r8:8027ecf4 r7:eb441e60 r6:85376880 r5:853eb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca380 INFO: task kworker/0:511:4880 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7a15000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb455000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544038c r4:85440000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544038c r4:854b2f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:854b2fac r7:82804d40 r6:dddced40 r5:dddced60 r4:854b2f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b2f80 r8:8027ecf4 r7:eb45de60 r6:85376900 r5:853eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca380 INFO: task kworker/0:512:4882 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7a15000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4883 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85472400 r4:85472400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85472400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ca940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85472400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544078c r4:85440400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544078c r4:854ce000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85472400 r8:854ce02c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce000 r8:8027ecf4 r7:eb45de60 r6:854ce080 r5:85472400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca680 INFO: task kworker/0:513:4883 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7f01000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4885 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb469d84 r8:00000002 r7:60000013 r6:eb469d8c r5:85473000 r4:85473000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85473000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85473000 r8:854ce12c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce100 r8:8027ecf4 r7:eb45de60 r6:854ce180 r5:85473000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca7c0 INFO: task kworker/0:514:4885 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b7f01000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r4:e8709dc0 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4888 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4888 tgid:4888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb485d84 r8:00000002 r7:60000113 r6:eb485d8c r5:85473c00 r4:85473c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85473c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cac40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85473c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb481000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440f8c r4:85440c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85440f8c r4:854ce200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85473c00 r8:854ce22c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce200 r8:8027ecf4 r7:eb45de60 r6:854ce280 r5:85473c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ca8c0 INFO: task kworker/0:515:4888 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85474800 r4:85474800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85474800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cad80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85474800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544138c r4:85441000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544138c r4:854ce300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:854ce300 r8:8027ecf4 r7:eb45de60 r6:854ce380 r5:85474800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:853e9800 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:853e9800 r8:854ce42c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854cad40 INFO: task kworker/0:517:4891 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: b8fdf000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe8709fb0 to 0xe8709ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:85476000 r4:85476000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85476000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd040 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85476000 r8:854ce4ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4c9d84 r8:00000002 r7:60000113 r6:eb4c9d8c r5:844b0000 r4:844b0000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b0000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544278c r4:85442400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544278c r4:854ce580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0000 r8:854ce5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce580 r8:8027ecf4 r7:eb4a9e60 r6:854ce600 r5:844b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:844b0c00 r4:844b0c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b0c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa39000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544238c r4:85442000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544238c r4:854ce680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0c00 r8:854ce6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce680 r8:8027ecf4 r7:eb4c9e60 r6:854ce700 r5:844b0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854dd180 INFO: task kworker/0:520:4898 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4901 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:844b1800 r5:844b1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd800 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85442b8c r4:85442800 r10:00000000 r9:854ce780 r8:8027ecf4 r7:eb4c9e60 r6:854ce800 r5:844b1800 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:4903 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddb00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46bf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544338c r4:85443000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544338c r4:854ce880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ed400 r8:854ce8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce880 r8:8027ecf4 r7:eb4b5e60 r6:85376a00 r5:853ed400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe8709d20 to 0xe8709d68) 9d60: 80000013 ffffffff r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85022b8c r4:85022800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4904 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:853ea400 r4:853ea400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ea400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dd980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0437000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85442f8c r4:85442c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85442f8c r4:854ce900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ea400 r8:854ce92c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce900 r8:8027ecf4 r7:eb4d1e60 r6:85376a80 r5:853ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4906 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4ddd84 r8:00000002 r7:60000013 r6:eb4ddd8c r5:852ea400 r4:852ea400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ea400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bc8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544838c r4:85448000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544838c r4:854ce980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:854ce9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854ce980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ce980 r8:8027ecf4 r7:eb4d1e60 r6:85376b00 r5:852ea400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854dd780 INFO: task kworker/0:524:4906 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 INFO: task kworker/0:525:4908 blocked for more than 474 seconds. Call trace: [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddc00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544378c r4:85443400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544378c r4:854cea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ee000 r8:854cea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854cea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cea00 r8:8027ecf4 r7:eb4dde60 r6:85376b80 r5:853ee000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ddbc0 INFO: task kworker/0:525:4908 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ba561000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe8709fb0 to 0xe8709ff8) INFO: task kworker/0:526:4910 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:853f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r10:61c88647 r9:853f0c00 r8:854ceaac r7:82804d40 r6:dddced40 r5:dddced60 r4:854cea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cea80 r8:8027ecf4 r7:eb4dde60 r6:85376c00 r5:853f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4edfb0 to 0xeb4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854dda00 INFO: task kworker/0:526:4910 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ba724000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 r4:844b2400 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddec0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac67000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85443f8c r4:85443c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85443f8c r4:854ceb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b2400 r8:854ceb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ceb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ceb00 r8:8027ecf4 r7:eb4dde60 r6:854ceb80 r5:844b2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ddc40 INFO: task kworker/0:527:4912 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe8709fb0 to 0xe8709ff8) INFO: task kworker/0:528:4915 blocked for more than 475 seconds. Call trace: [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eafe1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b3000 r8:854cec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854cec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cec00 r8:8027ecf4 r7:eb4dde60 r6:854cec80 r5:844b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ddf80 INFO: task kworker/0:528:4915 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bb126000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4916 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:844b3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ddfc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544878c r4:85448400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544878c r4:854ced00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b3c00 r8:854ced2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854ced00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ced00 r8:8027ecf4 r7:eb4f5e60 r6:854ced80 r5:844b3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb41dfb0 to 0xeb41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4920 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:844b4800 r4:844b4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847abf80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85448b8c r4:85448800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85448b8c r4:854cee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b4800 r8:854cee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854cee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cee00 r8:8027ecf4 r7:eb4f5e60 r6:854cee80 r5:844b4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2080 INFO: task kworker/0:530:4920 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bbc53000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4921 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:844b5400 r4:844b5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854cef00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2240 INFO: task kworker/0:531:4921 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bbc53000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:4923 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:844b6000 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe8709fb0 to 0xe8709ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb509d84 r8:00000002 r7:60000113 r6:eb509d8c r5:844b6c00 r4:844b6c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b6c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2640 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85449b8c r4:85449800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85449b8c r4:854f6100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b6c00 r8:854f612c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6100 r8:8027ecf4 r7:eb4f5e60 r6:854f6180 r5:844b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2340 INFO: task kworker/0:533:4925 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bc979000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85476c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544a38c r4:8544a000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544a38c r4:854f6200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:85475400 r8:854f632c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:536 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r5:8544a78c r4:8544a400 r4:00000001 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bd40b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r4:853f0000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb521fb0 to 0xeb521ff8) Call trace: r4:82ac21e4 r4:00000000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4935 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:853f3000 r4:853f3000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f3000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544ab8c r4:8544a800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544ab8c r4:854f6500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3000 r8:854f652c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6500 r8:8027ecf4 r7:eb521e60 r6:85376d80 r5:853f3000 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:539 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:853f3c00 r4:853f3c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f3c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2f00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b38c r4:8544b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544b38c r4:854f6580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3c00 r8:854f65ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6580 r8:8027ecf4 r7:eb521e60 r6:85376e00 r5:853f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2a00 INFO: task kworker/0:539:4936 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bdbe6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d60: 80000013 ffffffff r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:853f5400 r4:853f5400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f5400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2eb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bb8c r4:8544b800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544bb8c r4:854f6600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f5400 r8:854f662c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6600 r8:8027ecf4 r7:eb529e60 r6:85376e80 r5:853f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2d00 INFO: task kworker/0:540:4939 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bdf52000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4940 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:853f6000 r4:853f6000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f6000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2f80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544b78c r4:8544b400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544b78c r4:854f6680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f6000 r8:854f66ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6680 r8:8027ecf4 r7:eb531e60 r6:85376f00 r5:853f6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854f2d00 INFO: task kworker/0:541:4940 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: be817000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545038c r4:85450000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545038c r4:854f6700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f6c00 r8:854f672c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6700 r8:8027ecf4 r7:eb531e60 r6:85376f80 r5:853f6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501100 INFO: task kworker/0:542:4943 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bf1d0000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4945 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:853f4800 r4:853f4800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f4800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544bf8c r4:8544bc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544bf8c r4:854f6780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f4800 r8:854f67ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb53dfb0 to 0xeb53dff8) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4947 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:853f1800 r4:853f1800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f1800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4950 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:853e8c00 r4:853e8c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545078c r4:85450400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545078c r4:854f6880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:854f68ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6880 r8:8027ecf4 r7:eb541e60 r6:85504100 r5:853e8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855010c0 INFO: task kworker/0:545:4950 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bfc61000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4951 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4951 tgid:4951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:853f8000 r4:853f8000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f8000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f2e40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847c578c r4:847c5400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847c578c r4:85504180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8000 r8:855041ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504180 r8:8027ecf4 r7:eb345e60 r6:85504200 r5:853f8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ebbc0 INFO: task kworker/1:365:4951 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: bffc9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:844bb800 task:kworker/0:546 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501c80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb575000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85450f8c r4:85450c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85450f8c r4:854f6900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8c00 r8:854f692c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6900 r8:8027ecf4 r7:eb541e60 r6:85504280 r5:853f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855010c0 INFO: task kworker/0:546:4953 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0109000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4954 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb549d84 r8:00000002 r7:60000013 r6:eb549d8c r5:853f9800 r4:853f9800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f9800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d038c r4:853d0000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d038c r4:85504300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f9800 r8:8550432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504300 r8:8027ecf4 r7:eb519e60 r6:85504380 r5:853f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854eb2c0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0269000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) r4:844bb800 task:kworker/1:367 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff340 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d078c r4:853d0400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d078c r4:85504400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fa400 r8:8550442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504400 r8:8027ecf4 r7:eb549e60 r6:85504480 r5:853fa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff080 INFO: task kworker/1:367:4956 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0504000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4958 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:853fb000 r4:853fb000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fb000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d0b8c r4:853d0800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d0b8c r4:85504500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fb000 r8:8550452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504500 r8:8027ecf4 r7:eb545e60 r6:85504580 r5:853fb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff1c0 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c0963000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r5:80000013 r4:80239bb0 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4960 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:853fbc00 r4:853fbc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fbc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f280 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d1b8c r4:853d1800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d1b8c r4:85504600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fbc00 r8:8550462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504600 r8:8027ecf4 r7:eb54de60 r6:85504680 r5:853fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff300 INFO: task kworker/1:369:4960 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb559000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d0f8c r4:853d0c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d0f8c r4:85504700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fc800 r8:8550472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504700 r8:8027ecf4 r7:eb551e60 r6:85504780 r5:853fc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff300 INFO: task kworker/1:370:4961 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:853fd400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffd80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d138c r4:853d1000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d138c r4:85504800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fd400 r8:8550482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504800 r8:8027ecf4 r7:eb551e60 r6:85504880 r5:853fd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854ff5c0 INFO: task kworker/1:371:4964 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c1162000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:547 state:D stack:0 pid:4967 tgid:4967 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:853fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545278c r4:85452400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545278c r4:854f6980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fe000 r8:854f69ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6980 r8:8027ecf4 r7:eb4fde60 r6:85504900 r5:853fe000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501a80 INFO: task kworker/0:547:4967 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c1240000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4968 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8545138c r4:85451000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545138c r4:854f6a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400000 r8:854f6a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6a00 r8:8027ecf4 r7:eb591e60 r6:85504980 r5:85400000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501a80 INFO: task kworker/0:548:4968 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c16c7000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85401800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85401800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545178c r4:85451400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545178c r4:854f6a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85401800 r8:854f6aac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6a80 r8:8027ecf4 r7:eb591e60 r6:85504a00 r5:85401800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501b00 INFO: task kworker/0:549:4970 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c196b000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:85400c00 r4:85400c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85400c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85501940 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85400c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85451b8c r4:85451800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85451b8c r4:854f6b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85400c00 r8:854f6b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6b00 r8:8027ecf4 r7:eb591e60 r6:85504a80 r5:85400c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4974 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:85403c00 r4:85403c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85403c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855013c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85403c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85451f8c r4:85451c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85451f8c r4:854f6b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85403c00 r8:854f6bac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6b80 r8:8027ecf4 r7:eb591e60 r6:85504b00 r5:85403c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501e00 INFO: task kworker/0:551:4974 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c2124000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4977 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:85402400 r4:85402400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85402400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85402400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8545238c r4:854f6c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe8709d20 to 0xe8709d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:84753f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:553 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85405400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85452b8c r4:85452800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85452b8c r4:854f6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85405400 r8:854f6cac r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6c80 r8:8027ecf4 r7:eb591e60 r6:85504c00 r5:85405400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855001c0 INFO: task kworker/0:553:4980 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c29d2000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:85479800 r4:85479800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85479800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500580 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85479800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85452f8c r4:85452c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85452f8c r4:854f6d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85479800 r8:854f6d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4984 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:8547b000 r4:8547b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855007c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545338c r4:85453000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545338c r4:854f6e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547b000 r8:854f6e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6e00 r8:8027ecf4 r7:eb5b9e60 r6:854f6e80 r5:8547b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500400 INFO: task kworker/0:555:4984 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c35a9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:4985 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:8547bc00 r4:8547bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855008c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545378c r4:85453400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545378c r4:854f6f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547bc00 r8:854f6f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f6f00 r8:8027ecf4 r7:eb5e1e60 r6:854f6f80 r5:8547bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500400 INFO: task kworker/0:556:4985 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c384a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4989 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:8547d400 r4:8547d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500a00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0671000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85453b8c r4:85453800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85453b8c r4:854fc000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547d400 r8:854fc02c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc000 r8:8027ecf4 r7:eb579e60 r6:854fc080 r5:8547d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855006c0 INFO: task kworker/0:557:4989 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c3bb1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:4990 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f9d84 r8:00000002 r7:60000013 r6:eb5f9d8c r5:8547e000 r4:8547e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85500d40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8547e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea977000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545438c r4:85454000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545438c r4:854fc100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547e000 r8:854fc12c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc100 r8:8027ecf4 r7:eb5f5e60 r6:854fc180 r5:8547e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85500880 INFO: task kworker/0:558:4990 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c40dc000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:4992 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb479d84 r8:00000002 r7:60000013 r6:eb479d8c r5:8547c800 r4:8547c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:854fc200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c44d4000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4994 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85478000 r4:85478000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85478000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855024c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85478000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454b8c r4:85454800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85454b8c r4:854fc300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478000 r8:854fc32c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc300 r8:8027ecf4 r7:eb5f9e60 r6:854fc380 r5:85478000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4997 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:8547ec00 r4:8547ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8547ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f380 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eacef000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4998 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:85480000 r4:85480000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85480000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502340 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85480000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85480000 r8:854fc4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85500080 Call trace: 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4999 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb619d84 r8:00000002 r7:60000113 r6:eb619d8c r5:85480c00 r4:85480c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85480c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567e440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85480c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d3b8c r4:853d3800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d3b8c r4:85504d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85480c00 r8:85504d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504d00 r8:8027ecf4 r7:eb60de60 r6:854fc580 r5:85480c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550f2c0 INFO: task kworker/1:373:4999 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c4f7f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:5001 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:85481800 r4:85481800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85481800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f600 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85481800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d238c r4:853d2000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d238c r4:85504d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85481800 r8:85504dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85504d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85504d80 r8:8027ecf4 r7:eb619e60 r6:854fc600 r5:85481800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550f2c0 INFO: task kworker/1:374:5001 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c5200000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:5004 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:85483c00 r4:85483c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85483c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855028c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf29000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545538c r4:85455000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545538c r4:854fc680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85483c00 r8:854fc6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc680 r8:8027ecf4 r7:eb601e60 r6:854fc700 r5:85483c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855022c0 INFO: task kworker/0:562:5004 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c55f6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:5006 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:5006 tgid:5006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:85484800 r4:85484800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85484800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502740 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85484800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae17000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454f8c r4:85454c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85454f8c r4:854fc780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85484800 r8:854fc7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc780 r8:8027ecf4 r7:eb621e60 r6:854fc800 r5:85484800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855025c0 INFO: task kworker/0:563:5006 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c55f6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:5008 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb611d84 r8:00000002 r7:60000013 r6:eb611d8c r5:85485400 r4:85485400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85485400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85485400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545578c r4:85455400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545578c r4:854fc880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85485400 r8:854fc8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc880 r8:8027ecf4 r7:eb621e60 r6:854fc900 r5:85485400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855025c0 INFO: task kworker/0:564:5008 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c57e8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:5010 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5fdd84 r8:00000002 r7:60000013 r6:eb5fdd8c r5:85482400 r4:85482400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85482400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502b40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85482400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb015000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455b8c r4:85455800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85455b8c r4:854fc980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85482400 r8:854fc9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fc980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fc980 r8:8027ecf4 r7:eb611e60 r6:854fca00 r5:85482400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85502900 INFO: task kworker/0:565:5010 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c5ab6000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5013 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:85486c00 r4:85486c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85486c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502cc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85486c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455f8c r4:85455c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85455f8c r4:854fca80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486c00 r8:854fcaac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fca80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fca80 r8:8027ecf4 r7:eb5fde60 r6:854fcb00 r5:85486c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855025c0 INFO: task kworker/0:566:5013 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c5cbc000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:5014 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:85483000 r4:85483000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85483000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b100 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85483000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545678c r4:85456400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545678c r4:854fcb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85483000 r8:854fcbac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fcb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fcb80 r8:8027ecf4 r7:eb629e60 r6:854fcc00 r5:85483000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c6261000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:5015 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb631d84 r8:00000002 r7:60000013 r6:eb631d8c r5:85478c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502f40 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545638c r4:85456000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545638c r4:854fcc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85478c00 r8:854fccac r7:82804d40 r6:dddced40 r5:dddced60 r4:854fcc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fcc80 r8:8027ecf4 r7:eb62de60 r6:854fcd00 r5:85478c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85502ac0 INFO: task kworker/0:568:5015 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe8709d20 to 0xe8709d68) r4:82ac21e4 r4:e8709dc0 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:5018 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85406000 r5:85406000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:5021 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:85403000 r4:85403000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85403000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b640 r4:00000000 r9:83018005 r8:85403000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r10:61c88647 r9:85403000 r8:854fce2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80000013 ffffffff r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:5024 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85408000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e8709dc0 r5:85022b8c r4:85022800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:85409800 r4:85409800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85409800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b500 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85409800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545738c r4:85457000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545738c r4:854fcf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85409800 r8:854fcf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854fcf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fcf00 r8:8027ecf4 r7:eb641e60 r6:85504f80 r5:85409800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b200 INFO: task kworker/0:572:5026 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:5027 blocked for more than 477 seconds. r10:829187f4 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:8540a400 r5:8540a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb437000 r10:61c88647 r9:8540a400 r8:854fcfac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b4c0 INFO: task kworker/0:573:5027 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c6fab000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8540b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b7c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457b8c r4:85457800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85457b8c r4:85511000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540b000 r8:8551102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511000 r8:8027ecf4 r7:eb659e60 r6:85516080 r5:8540b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b4c0 INFO: task kworker/0:574:5028 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c70f3000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:5031 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:85408c00 r4:85408c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85408c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b900 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85408c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb415000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85457f8c r4:85511080 r4:00000001 r4:8550b5c0 INFO: task kworker/0:575:5031 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c7343000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:00001000 r4:e0439000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:8540bc00 r4:8540bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8540bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb711000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8555cf8c r4:85516180 Exception stack(0xeb66dfb0 to 0xeb66dff8) r4:8550fd80 Workqueue: events bpf_prog_free_deferred 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:5033 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:8540d400 r4:8540d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ba40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb423000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555838c r4:85558000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555838c r4:85511100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540d400 r8:8551112c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511100 r8:8027ecf4 r7:eb659e60 r6:85516280 r5:8540d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b780 INFO: task kworker/0:576:5033 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c799a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8540c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550be00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558f8c r4:85558c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85558f8c r4:85511180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540c800 r8:855111ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85511180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511180 r8:8027ecf4 r7:eb659e60 r6:85516300 r5:8540c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550b8c0 INFO: task kworker/0:577:5035 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe8709d20 to 0xe8709d68) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r5:80000013 r4:80239bb0 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5038 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb685d84 r8:00000002 r7:60000113 r6:eb685d8c r5:8540e000 r4:8540e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bcc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 r5:85558b8c r4:85558800 r10:61c88647 r9:8540e000 r8:8551122c r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r5:85022b8c r4:85022800 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:5039 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb689d84 r8:00000002 r7:60000013 r6:eb689d8c r5:8540ec00 r4:8540ec00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8540ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85502ac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8540ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb473000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555978c r4:85559400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555978c r4:85511280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8540ec00 r8:855112ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85511280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511280 r8:8027ecf4 r7:eb679e60 r6:85516400 r5:8540ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550bb40 INFO: task kworker/0:579:5039 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85406c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bf40 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85406c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb461000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555938c r4:85559000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555938c r4:85511300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85406c00 r8:8551132c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511300 r8:8027ecf4 r7:eb689e60 r6:85516480 r5:85406c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550bc80 INFO: task kworker/0:580:5041 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe8709d20 to 0xe8709d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:00001000 r4:e0439000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:5043 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:85404800 r4:85404800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85404800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527780 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85404800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555af8c r4:8555ac00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555af8c r4:85511380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85404800 r8:855113ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85511380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511380 r8:8027ecf4 r7:eb689e60 r6:85516500 r5:85404800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550bdc0 INFO: task kworker/0:581:5043 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c84d9000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:5045 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb635d84 r8:00000002 r7:60000013 r6:eb635d8c r5:85588c00 r4:85588c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85588c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85588c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb487000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559b8c r4:85559800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85559b8c r4:85511400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588c00 r8:8551142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511400 r8:8027ecf4 r7:eb699e60 r6:85511480 r5:85588c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8550f880 INFO: task kworker/0:582:5045 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c8542000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:5048 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:85589800 r4:85589800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85589800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527040 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb495000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559f8c r4:85559c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85559f8c r4:85511500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85589800 r8:8551152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511500 r8:8027ecf4 r7:eb699e60 r6:85511580 r5:85589800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527080 INFO: task kworker/0:583:5048 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c89ae000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:5049 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb69dd84 r8:00000002 r7:60000013 r6:eb69dd8c r5:8558a400 r4:8558a400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855272c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a3000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a38c r4:8555a000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555a38c r4:85511600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558a400 r8:8551162c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511600 r8:8027ecf4 r7:eb699e60 r6:85511680 r5:8558a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527240 INFO: task kworker/0:584:5049 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c8c01000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:5052 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:8558b000 r4:8558b000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527480 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a78c r4:8555a400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555a78c r4:85511700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558b000 r8:8551172c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511700 r8:8027ecf4 r7:eb699e60 r6:85511780 r5:8558b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527200 INFO: task kworker/0:585:5052 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c8e1f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:5054 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:8558bc00 r4:8558bc00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855275c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ab8c r4:8555a800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555ab8c r4:85511800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558bc00 r8:8551182c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511800 r8:8027ecf4 r7:eb699e60 r6:85511880 r5:8558bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527200 INFO: task kworker/0:586:5054 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c92fb000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:5056 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:8558c800 r4:8558c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527a80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c9000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b78c r4:8555b400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555b78c r4:85511900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558c800 r8:8551192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511900 r8:8027ecf4 r7:eb699e60 r6:85511980 r5:8558c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527600 INFO: task kworker/0:587:5056 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c94fd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:5058 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:8558d400 r4:8558d400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bd000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555b38c r4:8555b000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555b38c r4:85511a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558d400 r8:85511a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511a00 r8:8027ecf4 r7:eb6b5e60 r6:85511a80 r5:8558d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527800 INFO: task kworker/0:588:5058 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c94fd000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:5060 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:8558e000 r4:8558e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527c00 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8558e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555bb8c r4:8555b800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555bb8c r4:85511b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558e000 r8:85511b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511b00 r8:8027ecf4 r7:eb6b5e60 r6:85511b80 r5:8558e000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 9d60: 80000013 ffffffff r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:5062 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8558ec00 r5:8558ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb6e1000 r7:dddced40 r6:83018000 r5:8555bf8c r4:85511c00 r10:61c88647 r9:8558ec00 r8:85511c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511c00 r8:8027ecf4 r7:eb6cde60 r6:85511c80 r5:8558ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527b40 INFO: task kworker/0:590:5062 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c9819000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/0:591:5064 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:85588000 r4:85588000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85588000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85527b80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527b80 INFO: task kworker/0:591:5064 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c9d3f000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8547a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555df8c r4:8555dc00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555df8c r4:85511e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8547a400 r8:85511e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85511e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85511e00 r8:8027ecf4 r7:eb6e5e60 r6:85511e80 r5:8547a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85527d40 INFO: task kworker/0:592:5066 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: c9f48000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 Exception stack(0xe8709fb0 to 0xe8709ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:593 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:85486000 r4:85486000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85486000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:85486000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85501680 INFO: task kworker/0:593:5067 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ca312000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e0439000 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:594:5070 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:84a00000 r4:84a00000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a00000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb705000 r10:61c88647 r9:84a00000 r8:8554002c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80000013 ffffffff r4:e8709dc0 r4:00000000 [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:595 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb719d84 r8:00000002 r7:60000013 r6:eb719d8c r5:85411800 r4:85411800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85411800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f700 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85411800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa43000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555d78c r4:8555d400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555d78c r4:85540080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85411800 r8:855400ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540080 r8:8027ecf4 r7:eb6f1e60 r6:85516600 r5:85411800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553f080 INFO: task kworker/0:595:5071 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ca910000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:5075 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:85410c00 r4:85410c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85410c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f840 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb53000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555db8c r4:8555d800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555db8c r4:85540100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85410c00 r8:8554012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540100 r8:8027ecf4 r7:eb6f1e60 r6:85516680 r5:85410c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553f580 INFO: task kworker/0:596:5075 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cab3d000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe8709fb0 to 0xe8709ff8) Workqueue: events bpf_prog_free_deferred r5:85410000 r4:829187f0 r4:00000000 r5:8555f38c r4:8555f000 dfa0: 00000000 00000000 00000000 00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r5:85022b8c r4:85022800 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:5079 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb735d84 r8:00000002 r7:60000013 r6:eb735d8c r5:85412400 r4:85412400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85412400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fac0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85412400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fb000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555e38c r4:8555e000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85540200 r8:8027ecf4 r7:eb72de60 r6:85516780 r5:85412400 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85413000 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb73dfb0 to 0xeb73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553fb00 INFO: task kworker/0:599:5081 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: caea1000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5083 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb745d84 r8:00000002 r7:60000113 r6:eb745d8c r5:85415400 r4:85415400 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85415400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fd80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85415400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555eb8c r4:8555e800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555eb8c r4:85540300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85415400 r8:8554032c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540300 r8:8027ecf4 r7:eb72de60 r6:85516880 r5:85415400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:600:5083 is blocked on a mutex likely owned by task kworker/0:153:3780. Exception stack(0xe8709d20 to 0xe8709d68) r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85416c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85416c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fe80 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85416c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac99000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ef8c r4:8555ec00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555ef8c r4:85540380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85416c00 r8:855403ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540380 r8:8027ecf4 r7:eb72de60 r6:85516980 r5:85416c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553fc00 INFO: task kworker/0:601:5086 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cb6c3000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:5087 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:853fec00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86d000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853d278c r4:853d2400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853d278c r4:85516900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fec00 r8:8551692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85516900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85516900 r8:8027ecf4 r7:eb619e60 r6:85516a00 r5:853fec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85526800 INFO: task kworker/1:376:5087 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cba0a000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:5088 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:eb759d84 r8:00000002 r7:60000013 r6:eb759d8c r5:85413c00 r5:85413c00 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:eae95000 r7:dddced40 r6:83018000 r5:8555f78c r4:85540400 Exception stack(0xeb759fb0 to 0xeb759ff8) task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e8709dc0 r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r4:84753f00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:603 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85416000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f240 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85416000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbf000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555fb8c r4:8555f800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555fb8c r4:85540480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85416000 r8:855404ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540480 r8:8027ecf4 r7:eb759e60 r6:85516b00 r5:85416000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8553fd00 INFO: task kworker/0:603:5090 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cbf66000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:5092 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:85598c00 r4:85598c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85598c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce0c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85598c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85598c00 r8:8554052c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cc27e000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85598000 r5:85598000 r4:829187f0 r4:00000000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cc3b0000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:606 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:85599800 r4:85599800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85599800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85526980 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85599800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb107000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556038c r4:85560000 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8556038c r4:85540600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85599800 r8:8554062c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85540600 r8:8027ecf4 r7:eb769e60 r6:85516c80 r5:85599800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 r4:e8709dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:607:5098 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred r5:8559a400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85560b8c r4:85560800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85560b8c r4:85540680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559a400 r8:855406ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540680 r8:8027ecf4 r7:eb769e60 r6:85516d00 r5:8559a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce100 INFO: task kworker/0:607:5098 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cc779000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8559d400 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce440 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85560f8c r4:85560c00 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85560f8c r4:85540700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559d400 r8:8554072c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85540700 r8:8027ecf4 r7:eb781e60 r6:85516d80 r5:8559d400 task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:5103 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:8559e000 r4:8559e000 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559e000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb1eb000 r10:61c88647 r9:8559e000 r8:855407ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bb0 r4:00000000 r5:00001000 r4:e0439000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8559c800 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559c800 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce6c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d1000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556178c r4:85561400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8556178c r4:85540800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559c800 r8:8554082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540800 r8:8027ecf4 r7:eb791e60 r6:85516e80 r5:8559c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce3c0 INFO: task kworker/0:610:5106 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cd4ff000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 r5:00001000 r4:e0439000 r4:84753f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8559bc00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85561f8c r4:85561c00 r10:61c88647 r9:8559bc00 r8:855408ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85540880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540880 r8:8027ecf4 r7:eb799e60 r6:85516f00 r5:8559bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce5c0 INFO: task kworker/0:611:5107 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: cd8fe000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8559ec00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a6b3c4>] (__mutex_lock_slowpath) from [<81a6b418>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6b3dc>] (mutex_lock) from [<804e4e94>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce880 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e5000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85561b8c r4:85561800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85561b8c r4:85540900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559ec00 r8:8554092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540900 r8:8027ecf4 r7:eb79de60 r6:85516f80 r5:8559ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:613 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8559b000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ceb80 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r5:00001000 r4:e0439000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85414800 r4:829187f0 [<81a6ac0c>] (__mutex_lock.constprop.0) from [<81a6b3d8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cecc0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85414800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34b000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556278c r4:85562400 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8556278c r4:85540a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85414800 r8:85540a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85540a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85540a00 r8:8027ecf4 r7:eb7a5e60 r6:855d9080 r5:85414800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cea00 INFO: task kworker/0:614:5113 is blocked on a mutex likely owned by task kworker/0:153:3780. task:kworker/0:153 state:R running task stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68874>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848ba400 r8:80200be4 r7:e8709d54 r6:ffffffff r5:848ba400 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ce4e8000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84753f00 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85590000 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a68834>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe8709d20 to 0xe8709d68) 9d20: ce974000 e041a000 00000001 80239b98 7f16f000 00000001 82ac21c4 82ac15a0 9d40: 7f16f000 e041a000 8280c9b4 e8709d9c e8709da0 e8709d70 80230ad4 80239bb0 9d60: 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4c58>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e49d4>] (__purge_vmap_area_lazy) from [<804e5010>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e8709dc0 r5:e8709e08 r4:e8709dc0 [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e2c>] (_vm_unmap_aliases) from [<804e8d84>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844bb8c0 r4:00000000 [<804e8c18>] (vfree) from [<80549edc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549eac>] (execmem_free) from [<803c6c9c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6c8c>] (bpf_jit_free_exec) from [<803c707c>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7014>] (bpf_jit_free) from [<803c810c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85022b8c r4:85022800 [<803c7fc0>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85022b8c r4:84753f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:84753f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84753f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84753f00 r8:8027ecf4 r7:e46fde60 r6:84753f80 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8709fb0 to 0xe8709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844bb800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:5117 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a674b8>] (__schedule) from [<81a68440>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a674b8>] (__schedule) from [<81a68440>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7b1d84 r8:00000002 r7:60000013 r6:eb7b1d8c r5:85590c00 r4:85590c00 [<81a68414>] (schedule) from [<81a68828>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85590c00 r4:829187f0 [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a68810>] (schedule_preempt_disabled) from [<81a6af0c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747)