Extracting prog: 5m3.71044775s Minimizing prog: 1h15m37.875394513s Simplifying prog options: 0s Extracting C: 8m38.604928265s Simplifying C: 58m30.385860512s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h27m50.57665435s repro crashed as (corrupted=false): INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:833a2400 r4:833a2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd2e80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84fce38c r4:84fce000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fce38c r4:83363680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a2400 r8:833636ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83363680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027f5e8 r7:df83de60 r6:83363700 r5:833a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8335ff40 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6649000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/0:3:1791 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:1791 tgid:1791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0f1d84 r8:00000002 r7:60000013 r6:eb0f1d8c r5:83aac800 r4:83aac800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aac800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aac800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85082f8c r4:85082c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85082f8c r4:842c9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aac800 r8:842c98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:842c9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842c9880 r8:8027f5e8 r7:df83de60 r6:842c9900 r5:83aac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83f1fc00 INFO: task kworker/0:3:1791 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6649000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/0:0:3102 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3102 tgid:3102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:84613000 r4:84613000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84613000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84613000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec591000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85081f8c r4:85081c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85081f8c r4:8477f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84613000 r8:8477f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8477f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477f800 r8:8027f5e8 r7:eb0f1e60 r6:8477fa00 r5:84613000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83351d00 INFO: task kworker/0:0:3102 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6964000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/0:1:3115 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:84611800 r4:84611800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84611800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bfc00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84611800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb593000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85083b8c r4:85083800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083b8c r4:8477f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84611800 r8:8477f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8477f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477f900 r8:8027f5e8 r7:eb0f1e60 r6:8477f780 r5:84611800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84777600 INFO: task kworker/0:1:3115 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6964000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:1:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83242400 r4:83242400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd3c00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4478c r4:84d44400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4478c r4:84773500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:8477352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773500 r8:8027f5e8 r7:df959e60 r6:8477fa80 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9840 INFO: task kworker/1:1:3120 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6964000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:5:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:84616000 r4:84616000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84616000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84616000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85338f8c r4:85338c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85338f8c r4:84773e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84616000 r8:84773eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773e80 r8:8027f5e8 r7:df9c1e60 r6:8477fb80 r5:84616000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9a00 INFO: task kworker/1:5:3123 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6bc0000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:6:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:833a5400 r4:833a5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d9a00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb95000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f24b8c r4:84f24800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f24b8c r4:84773980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a5400 r8:847739ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773980 r8:8027f5e8 r7:df9cde60 r6:8477fc00 r5:833a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9b80 INFO: task kworker/1:6:3125 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e6bc0000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:7:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:83863c00 r4:83863c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83863c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83863c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f25f8c r4:84f25c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f25f8c r4:84773a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83863c00 r8:84773aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773a80 r8:8027f5e8 r7:df9cde60 r6:8477fc80 r5:83863c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9cc0 INFO: task kworker/1:7:3127 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e7bdc000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:8:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83865400 r4:83865400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83865400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ad680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83865400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb41000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f26b8c r4:84f26800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f26b8c r4:84773b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83865400 r8:84773bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773b80 r8:8027f5e8 r7:df9cde60 r6:8477fd00 r5:83865400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9e40 INFO: task kworker/1:8:3129 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e7bdc000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 INFO: task kworker/1:9:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:83ab5400 r4:83ab5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85183000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4578c r4:84d45400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4578c r4:84773c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab5400 r8:84773c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773c00 r8:8027f5e8 r7:df9cde60 r6:8477fd80 r5:83ab5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d9f80 INFO: task kworker/1:9:3131 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e7bdc000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3133 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83ab3c00 r4:83ab3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524c100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee78c r4:850ee400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ee78c r4:84773c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab3c00 r8:84773cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773c80 r8:8027f5e8 r7:df9cde60 r6:8477fe00 r5:83ab3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847361c0 INFO: task kworker/1:10:3133 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e842a000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:83ab2400 r4:83ab2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524c040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0491000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ee38c r4:850ee000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ee38c r4:84773d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab2400 r8:84773d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773d00 r8:8027f5e8 r7:df9cde60 r6:8477fe80 r5:83ab2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736100 INFO: task kworker/1:11:3135 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e842a000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83238000 r4:83238000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847363c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83238000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eef8c r4:850eec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850eef8c r4:84773e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238000 r8:84773e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773e00 r8:8027f5e8 r7:df9cde60 r6:8477ff00 r5:83238000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736240 INFO: task kworker/1:12:3137 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e88ee000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83236000 r4:83236000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b2900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eeb8c r4:850ee800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850eeb8c r4:84773d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:84773dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773d80 r8:8027f5e8 r7:df9cde60 r6:8477ff80 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847363c0 INFO: task kworker/1:13:3139 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e88ee000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:83238c00 r4:83238c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535af80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83238c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d46b8c r4:84d46800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d46b8c r4:84773480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238c00 r8:847734ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773480 r8:8027f5e8 r7:df9cde60 r6:8477fb00 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736500 INFO: task kworker/1:14:3141 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8ac2000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa59d84 r8:00000002 r7:60000013 r6:dfa59d8c r5:83883c00 r4:83883c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83883c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ad9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa05000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529cb8c r4:8529c800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529cb8c r4:84773200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83883c00 r8:8477322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773200 r8:8027f5e8 r7:df9cde60 r6:8477f980 r5:83883c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736600 INFO: task kworker/1:15:3143 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8ac2000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3145 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:83884800 r4:83884800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83884800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c2380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83884800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541d38c r4:8541d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d38c r4:84773180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83884800 r8:847731ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84773180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84773180 r8:8027f5e8 r7:dfa59e60 r6:8477f100 r5:83884800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736740 INFO: task kworker/1:16:3145 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8dde000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3148 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83881800 r4:83881800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83881800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83881800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85455b8c r4:85455800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85455b8c r4:8336bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83881800 r8:8336bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8336bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8336bd80 r8:8027f5e8 r7:dfa69e60 r6:84422180 r5:83881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847369c0 INFO: task kworker/1:17:3148 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e8dde000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:84615400 r4:84615400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84615400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e34e40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84615400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558538c r4:85585000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558538c r4:84355780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84615400 r8:843557ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84355780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84355780 r8:8027f5e8 r7:dfa69e60 r6:84422200 r5:84615400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736b40 INFO: task kworker/1:18:3150 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9137000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:84020000 r4:84020000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84020000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84020000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e38c r4:8541e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e38c r4:84355700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84020000 r8:8435572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84355700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84355700 r8:8027f5e8 r7:dfa81e60 r6:83ffa900 r5:84020000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736bc0 INFO: task kworker/1:19:3151 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9137000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3153 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:84024800 r4:84024800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84024800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ed480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84024800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541fb8c r4:8541f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541fb8c r4:84587200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84024800 r8:8458722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84587200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84587200 r8:8027f5e8 r7:dfa81e60 r6:83ffa880 r5:84024800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736e00 INFO: task kworker/1:20:3153 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9137000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3157 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaadd84 r8:00000002 r7:60000013 r6:dfaadd8c r5:832ee000 r4:832ee000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832ee000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84777000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4778c r4:84d47400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4778c r4:84587380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832ee000 r8:845873ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84587380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84587380 r8:8027f5e8 r7:dfa81e60 r6:838e7b00 r5:832ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84736f00 INFO: task kworker/1:21:3157 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e98ce000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3159 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:84172400 r4:84172400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84172400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561fac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84172400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558678c r4:85586400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558678c r4:84325b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84172400 r8:84325b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84325b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84325b00 r8:8027f5e8 r7:dfa81e60 r6:838a2180 r5:84172400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb1c0 INFO: task kworker/1:22:3159 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e98ce000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:84175400 r4:84175400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84175400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84175400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b8b8c r4:856b8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856b8b8c r4:838a2980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84175400 r8:838a29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838a2980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2980 r8:8027f5e8 r7:dfa65e60 r6:838a2100 r5:84175400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb1c0 INFO: task kworker/1:23:3160 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9a71000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:84176000 r4:84176000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84176000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564a940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84176000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85587b8c r4:85587800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85587b8c r4:838a2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84176000 r8:838a292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:838a2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2900 r8:8027f5e8 r7:df97de60 r6:830b8700 r5:84176000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e280 INFO: task kworker/1:24:3162 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9fe5000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3164 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:84171800 r4:84171800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84171800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8476e280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84171800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb231000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a538c r4:855a5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a538c r4:830b8600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84171800 r8:830b862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8600 r8:8027f5e8 r7:df97de60 r6:830b8800 r5:84171800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e100 INFO: task kworker/1:25:3164 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: e9fe5000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3166 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84176c00 r4:84176c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84176c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85800680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bff8c r4:857bfc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857bff8c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84176c00 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:dfac1e60 r6:830b8400 r5:84176c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e340 INFO: task kworker/1:26:3166 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:84173c00 r4:84173c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84173c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce540 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb659000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a738c r4:855a7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855a738c r4:830b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84173c00 r8:830b86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027f5e8 r7:dfab9e60 r6:84c8e000 r5:84173c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e680 INFO: task kworker/1:27:3167 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:84170000 r4:84170000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84170000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508aec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84170000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85768b8c r4:85768800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85768b8c r4:84c8e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84170000 r8:84c8e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e080 r8:8027f5e8 r7:dfab9e60 r6:84c8e100 r5:84170000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e900 INFO: task kworker/1:28:3170 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:84174800 r4:84174800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84174800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7dc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84174800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec809000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577eb8c r4:8577e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577eb8c r4:84c8e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84174800 r8:84c8e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e180 r8:8027f5e8 r7:dfae1e60 r6:84c8e200 r5:84174800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e700 INFO: task kworker/1:29:3172 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:83302400 r4:83302400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83302400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83302400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e78c r4:8577e400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577e78c r4:84c8e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83302400 r8:84c8e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e280 r8:8027f5e8 r7:dfae9e60 r6:84c8e300 r5:83302400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476e9c0 INFO: task kworker/1:30:3175 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ea699000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb09d84 r8:00000002 r7:60000013 r6:dfb09d8c r5:8388a400 r4:8388a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8388a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508238c r4:85082000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508238c r4:838e7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388a400 r8:838e7aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:838e7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838e7a80 r8:8027f5e8 r7:eb0f1e60 r6:83898400 r5:8388a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476fa40 INFO: task kworker/0:4:3176 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: eb372000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:8388bc00 r4:8388bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8388bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfafb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577f78c r4:8577f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577f78c r4:84c8e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388bc00 r8:84c8e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e400 r8:8027f5e8 r7:dfae9e60 r6:83898380 r5:8388bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476ec40 INFO: task kworker/1:31:3178 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: eb372000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 INFO: task kworker/1:32:3180 blocked for more than 451 seconds. r10:82918930 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83aa3000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:8594038c r4:85940000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04d9d28 to 0xe04d9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:33:3182 blocked for more than 451 seconds. Call trace: r5:83aa3c00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f91c0 r5:84d4bf8c r4:84d4bc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4bf8c r4:84c8e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3c00 r8:84c8e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e580 r8:8027f5e8 r7:dfaf5e60 r6:84c8e600 r5:83aa3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8476ee80 INFO: task kworker/1:33:3182 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: eb6ec000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84170c00 r4:84170c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84170c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591a7c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f121000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4c38c r4:84d4c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 r4:e04d9dc0 r5:00001000 r4:dfe5d000 r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 Exception stack(0xe04d9fb0 to 0xe04d9ff8) INFO: task kworker/1:35:3187 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r5:83aa8000 r4:8291892c r4:00000000 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8000 r8:84c8e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e780 r8:8027f5e8 r7:dfb25e60 r6:84c8e800 r5:83aa8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ce100 INFO: task kworker/1:35:3187 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ebc5d000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83889800 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfb49fb0 to 0xdfb49ff8) Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80050013 ffffffff r4:e04d9dc0 r5:00001000 r4:dfe5d000 r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:83888c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83888c00 r8:84c8e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb51d84 r8:00000002 r7:60000013 r6:dfb51d8c r5:8388c800 r4:8388c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c82c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8388c800 r7:00000000 r6:83018200 r5:00001000 r4:7f24b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a9b8c r4:858a9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a9b8c r4:84c8e980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388c800 r8:84c8e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8e980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8e980 r8:8027f5e8 r7:dfb4de60 r6:832a1080 r5:8388c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ce580 INFO: task kworker/1:38:3192 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ec197000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 Exception stack(0xe04d9fb0 to 0xe04d9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:82918930 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:832ec800 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d60: 80230ad4 80239bb0 80050013 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r5:84ea678c r4:84ea6400 r4:84fab000 Exception stack(0xe04d9fb0 to 0xe04d9ff8) INFO: task kworker/1:40:3196 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r5:832e8000 r4:8291892c r4:00000000 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84c8ea80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea678c r4:84fab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab000 r8:8027f5e8 r7:e014de60 r6:84fab080 r5:84f6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa280 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:84da0000 r4:84da0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8fc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84da0000 r7:00000000 r6:83018200 r5:00001000 r4:7f245000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a8f8c r4:858a8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a8f8c r4:84c8eb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da0000 r8:84c8ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8eb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8eb80 r8:8027f5e8 r7:dfb55e60 r6:830cd100 r5:84da0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ceb80 INFO: task kworker/1:41:3200 is blocked on a mutex likely owned by task kworker/0:184:3715. task:kworker/0:184 state:R running task stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04d9d28 to 0xe04d9d70) 9d20: ec71e000 eca6d000 00000001 80239b98 7f173000 00000001 9d40: 82ac05a0 7f173000 eca6d000 8280c930 82ac11c4 e04d9da4 e04d9da8 e04d9d78 9d60: 80230ad4 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04d9dc0 r5:e04d9e08 r4:e04d9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f6ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea678c r4:84ea6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f6ec00 r8:84fab02c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:dfb39d84 r8:00000002 r7:60000013 r6:dfb39d8c r5:84da0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r9:83018205 r8:84da0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f243000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f6ec00 r8:80200be4 r7:e04d9d5c r6:ffffffff r5:84f6ec00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec94d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d20: 7f5ea000 eca73000 00000001 80239b98 7f185000 00000001 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb91d84 r8:00000002 r7:60000013 r6:dfb91d8c r5:84da2400 r4:84da2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ce980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84da2400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4d78c r4:85a4d400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4d78c r4:84c8ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da2400 r8:84c8ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8ed00 r8:8027f5e8 r7:dfb85e60 r6:830cd380 r5:84da2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846cefc0 INFO: task kworker/1:44:3206 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 7f5ea000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b94c0 r5:00001000 r4:dfb9b000 r7:ddde2d80 r6:83018200 r5:85a4cf8c r4:84c8ed80 r10:00000000 r9:84c8ed80 r8:8027f5e8 r7:dfb91e60 r6:84c8ee00 r5:83aad400 r4:84d14080 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:00001000 r4:dfe9b000 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:46 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d14080 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aabc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4d38c r4:85a4d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4d38c r4:84c8ee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aabc00 r8:84c8eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8ee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8ee80 r8:8027f5e8 r7:dfb99e60 r6:84c8ef00 r5:83aabc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14280 INFO: task kworker/1:46:3210 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 7fb8c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:84da3c00 r4:84da3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bf700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84da3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859db8c0 r5:00001000 r4:ec65f000 r7:ddde2d80 r6:83018200 r5:85a17b8c r4:84c8ef80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r4:00000000 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:48 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84da5400 r4:84da5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84da5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c80c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84da5400 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7df000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac178c r4:85ac1400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac178c r4:84c8eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da5400 r8:84c8eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84c8eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84c8eb00 r8:8027f5e8 r7:dfbb9e60 r6:847bb080 r5:84da5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14580 INFO: task kworker/1:48:3214 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8007d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84da6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r9:83018005 r8:84da6000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb64d000 r7:dddced80 r6:83018000 r5:8508438c r4:847bb100 Exception stack(0xdfb71fb0 to 0xdfb71ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:dfbc5d84 r8:00000002 r7:60000013 r6:dfbc5d8c r5:84da6c00 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb28f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508338c r4:85083000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508338c r4:847bb200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84da6c00 r8:847bb22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847bb200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bb200 r8:8027f5e8 r7:dfb71e60 r6:847bb280 r5:84da6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b9980 INFO: task kworker/0:7:3220 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8007d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:49 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r9:83018205 r8:84da3000 r7:00000000 r6:83018200 r5:00001000 r4:7f375000 r5:00001000 r4:ed089000 r7:ddde2d80 r6:83018200 r5:85a35b8c r4:846cd000 r10:00000000 r9:846cd000 r8:8027f5e8 r7:dfbbde60 r6:847bb300 r5:84da3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84df8000 r4:84df8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84df8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84df8000 r7:00000000 r6:83018200 r5:00001000 r4:7f375000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac2f8c r4:85ac2c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac2f8c r4:846cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df8000 r8:846cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd080 r8:8027f5e8 r7:dfbbde60 r6:847bb380 r5:84df8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14600 INFO: task kworker/1:50:3222 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80822000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 INFO: task kworker/1:51:3225 blocked for more than 451 seconds. r4:83aaa400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d149c0 INFO: task kworker/1:51:3225 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80822000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:83aa8c00 r4:83aa8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35680 r5:00001000 r4:ecfe3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84d6178c r4:846cd200 r4:846cd200 Exception stack(0xdfbedfb0 to 0xdfbedff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:84ea6b8c r4:84ea6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:53:3230 blocked for more than 451 seconds. r4:83aae000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f6eb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed007000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d6138c r4:84d61000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d6138c r4:846cd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aae000 r8:846cd32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd300 r8:8027f5e8 r7:dfbede60 r6:846cd380 r5:83aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84d14c00 INFO: task kworker/1:53:3230 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80c57000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84df8c00 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecf79000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35580 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f6e7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d61b8c r4:84d61800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d61b8c r4:846cd480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfa400 r8:846cd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd480 r8:8027f5e8 r7:dfc11e60 r6:847bb480 r5:84dfa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ce9c0 INFO: task kworker/1:55:3233 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 80c57000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r9:83018205 r8:84dfbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f6df000 r5:00001000 r4:ece5d000 r7:ddde2d80 r6:83018200 r5:84d5cb8c r4:846cd500 Exception stack(0xdfc2dfb0 to 0xdfc2dff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84df9800 r7:00000000 r6:83018200 r5:00001000 r4:7f6e3000 r5:00001000 r4:ecf29000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5c38c r4:84d5c000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5c38c r4:846cd580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84df9800 r8:846cd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd580 r8:8027f5e8 r7:dfc2de60 r6:847bb580 r5:84df9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84777640 INFO: task kworker/1:57:3236 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8174b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3238 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84dfb000 r4:84dfb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dfb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35240 r5:00001000 r4:ece97000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8174b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecd51000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84dfe000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r9:83018205 r8:84dfe000 r7:00000000 r6:83018200 r5:00001000 r4:7f6dd000 r5:00001000 r4:ece1f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:846cd700 r8:8027f5e8 r7:dfc4de60 r6:847bb700 r5:84dfe000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b8300 INFO: task kworker/1:60:3242 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8174b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3245 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:84e08000 r4:84e08000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e08000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571e940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e08000 r7:00000000 r6:83018200 r5:00001000 r4:7f6db000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5d38c r4:84d5d000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5d38c r4:846cd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e08000 r8:846cd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfc69fb0 to 0xdfc69ff8) r4:847b8400 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84e09800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r9:83018205 r8:84e09800 r7:00000000 r6:83018200 r5:00001000 r4:7f6d7000 r5:00001000 r4:ecc7d000 r7:ddde2d80 r6:83018200 r5:84d5df8c r4:846cd800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e09800 r8:846cd82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd800 r8:8027f5e8 r7:dfc4de60 r6:847bb800 r5:84e09800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b88c0 INFO: task kworker/1:62:3247 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 81c81000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84e08c00 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84e08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d5000 r5:00001000 r4:ecb91000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846cd880 r8:8027f5e8 r7:dfc4de60 r6:847bb880 r5:84e08c00 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e04e9dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:64 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:82ac11e4 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r4:84fab300 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:65:3253 blocked for more than 451 seconds. Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc99d84 r8:00000002 r7:60000113 r6:dfc99d8c r5:84e0bc00 r4:84e0bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b8b880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f589000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5f78c r4:84d5f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5f78c r4:846cd980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e0bc00 r8:846cd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cd980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cd980 r8:8027f5e8 r7:dfc91e60 r6:847bb980 r5:84e0bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc99fb0 to 0xdfc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b8ac0 INFO: task kworker/1:65:3253 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 824b2000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3255 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84e0d400 r4:84e0d400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0d400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23e00 r5:00001000 r4:ed5e3000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecacd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d5e78c r4:846cda80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: Exception stack(0xe04e9d28 to 0xe04e9d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3258 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcb5d84 r8:00000002 r7:60000013 r6:dfcb5d8c r5:84e0c800 r4:84e0c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bfd00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85083f8c r4:85083c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083f8c r4:847bbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e0c800 r8:847bbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847bbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bbb00 r8:8027f5e8 r7:dfb71e60 r6:847bbb80 r5:84e0c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847bec80 INFO: task kworker/0:8:3258 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 83046000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84dfc800 r4:84dfc800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dfc800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23f00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f60d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5eb8c r4:84d5e800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5eb8c r4:846cdb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfc800 r8:846cdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdb00 r8:8027f5e8 r7:dfca9e60 r6:847bbc00 r5:84dfc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b8d00 INFO: task kworker/1:68:3260 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 Exception stack(0xe04e9d28 to 0xe04e9d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:00001000 r4:dfe9b000 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 task:kworker/1:69 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ed5d5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84d5d78c r4:846cdb80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3265 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfce1d84 r8:00000002 r7:60000113 r6:dfce1d8c r5:84e0a400 r4:84e0a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e0a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23c00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d5f38c r4:84d5f000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d5f38c r4:846cdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e0a400 r8:846cdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdc00 r8:8027f5e8 r7:dfcc5e60 r6:847bbd00 r5:84e0a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d20: 83695000 eca73000 00000001 80239b98 7f185000 00000001 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa100 task:kworker/1:71 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:84e00000 r4:84e00000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e00000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d24c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e00000 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bf4b8c r4:85bf4800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bf4b8c r4:846cdc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e00000 r8:846cdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdc80 r8:8027f5e8 r7:dfcc5e60 r6:847bbd80 r5:84e00000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b9400 INFO: task kworker/1:71:3266 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3268 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84e01800 r4:84e01800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e01800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571ee40 r5:00001000 r4:ecb17000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1e38c r4:85b1e000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1e38c r4:846cdd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e01800 r8:846cdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cdd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdd00 r8:8027f5e8 r7:dfcc5e60 r6:847bbe00 r5:84e01800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc0280 INFO: task kworker/1:72:3268 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 83b64000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r5:84ea6b8c r4:84ea6800 r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84e00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f603000 r5:00001000 r4:dfced000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84e00c00 r8:846cddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc0100 INFO: task kworker/1:73:3270 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 83b64000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:84e03c00 r5:00001000 r4:ed997000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846cde00 r8:8027f5e8 r7:dfcc5e60 r6:847bbf00 r5:84e03c00 Exception stack(0xe04e9d28 to 0xe04e9d70) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3274 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84183000 r4:84183000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84183000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba5c40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84183000 r7:00000000 r6:83018200 r5:00001000 r4:7f603000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcff000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aeb78c r4:85aeb400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aeb78c r4:846cde80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84183000 r8:846cdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846cde80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bb0 r5:00001000 r4:dfe9b000 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c45f8c r4:85c45c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c45f8c r4:846cdf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84186c00 r8:846cdfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed8cf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85cd278c r4:84dce080 Exception stack(0xdfa09fb0 to 0xdfa09ff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84180000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fc040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84180000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084f8c r4:85084c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85084f8c r4:847bbf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84180000 r8:847bbfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847bbf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bbf80 r8:8027f5e8 r7:dfb71e60 r6:84dce200 r5:84180000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc8880 INFO: task kworker/0:9:3283 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 84362000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3284 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:84181800 r4:84181800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84181800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85706200 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84181800 r7:00000000 r6:83018200 r5:00001000 r4:7f709000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed743000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cd238c r4:85cd2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd238c r4:84dce180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84181800 r8:84dce1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dce180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dce180 r8:8027f5e8 r7:dfa09e60 r6:84dce280 r5:84181800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: 84774000 eca73000 00000001 80239b98 7f185000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3285 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3285 tgid:3285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa49d84 r8:00000002 r7:60000013 r6:dfa49d8c r5:84183c00 r4:84183c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84183c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bff00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84183c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb835000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508478c r4:85084400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508478c r4:84dcf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84183c00 r8:84dcf02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 9d20: 84774000 eca73000 00000001 80239b98 7f185000 00000001 r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3287 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:84180c00 r4:84180c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84180c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aac00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84180c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb879000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084b8c r4:85084800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85084b8c r4:84dcf080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84180c00 r8:84dcf0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf080 r8:8027f5e8 r7:dfa2de60 r6:84dce380 r5:84180c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dc8a40 INFO: task kworker/0:11:3287 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 84774000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:79:3289 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84dfec00 r4:84dfec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dfec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eccd00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84dfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f7c7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cd338c r4:85cd3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd338c r4:84dce400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dfec00 r8:84dce42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84dce400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dce400 r8:8027f5e8 r7:dfa09e60 r6:84dce480 r5:84dfec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847bec40 INFO: task kworker/1:79:3289 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8503b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3295 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:846a0c00 r4:846a0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846a0c00 r4:8291892c r4:00000000 r9:83018005 r8:846a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r5:00001000 r4:eb8db000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba43000 r7:dddced80 r6:83018000 r5:85085f8c r4:84dcf180 r4:84dc8e00 Exception stack(0xe04e9d28 to 0xe04e9d70) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:84e03000 r4:8291892c r4:00000000 r5:00001000 r4:eba1f000 r5:85085b8c r4:85085800 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9d28 to 0xe04e9d70) r5:00001000 r4:dfe9b000 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3301 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd2dd84 r8:00000002 r7:60000113 r6:dfd2dd8c r5:84e06000 r4:84e06000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e06000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd2de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fc5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e06000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508638c r4:85086000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508638c r4:84dcf300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e06000 r8:84dcf32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf300 r8:8027f5e8 r7:dfaa1e60 r6:84dcf380 r5:84e06000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd2dfb0 to 0xdfd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4300 INFO: task kworker/0:15:3301 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r5:00001000 r4:eba91000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086b8c r4:85086800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85086b8c r4:84dcf400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e06c00 r8:84dcf42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf400 r8:8027f5e8 r7:dfd2de60 r6:84dcf480 r5:84e06c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4180 INFO: task kworker/0:16:3303 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 859e6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba7b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508678c r4:85086400 r10:61c88647 r9:84e05400 r8:84dcf52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dd4500 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84e04800 r4:8291892c r4:00000000 r5:00001000 r4:ebabd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086f8c r4:85086c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85086f8c r4:84dcf600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e04800 r8:84dcf62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf600 r8:8027f5e8 r7:dfd29e60 r6:84dcf680 r5:84e04800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd45c0 INFO: task kworker/0:18:3306 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 859e6000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84faa100 Workqueue: events bpf_prog_free_deferred r4:84e02400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad7000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 INFO: task kworker/0:20:3311 blocked for more than 451 seconds. r10:82918930 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:846e8000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebc1f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85087b8c r4:84dcf800 Exception stack(0xdfd3dfb0 to 0xdfd3dff8) task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 85e4d000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:846e9800 r4:846e9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846e9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fca80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508778c r4:85087400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508778c r4:84dcf980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846e9800 r8:84dcf9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcf980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcf980 r8:8027f5e8 r7:dfd3de60 r6:84dcfa00 r5:846e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4ac0 INFO: task kworker/0:21:3314 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86319000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3315 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3315 tgid:3315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd45d84 r8:00000002 r7:60000113 r6:dfd45d8c r5:846ea400 r4:846ea400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846ea400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fccc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85087f8c r4:85087c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85087f8c r4:84dcfa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846ea400 r8:84dcfaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcfa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcfa80 r8:8027f5e8 r7:dfd3de60 r6:84dcfb00 r5:846ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd45fb0 to 0xdfd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4c00 INFO: task kworker/0:22:3315 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86319000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3318 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3318 tgid:3318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:846eb000 r4:846eb000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:846eb000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858fcd80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:846eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583838c r4:85838000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583838c r4:84dcfb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:846eb000 r8:84dcfbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84dcfb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dcfb80 r8:8027f5e8 r7:dfd45e60 r6:84dcfc00 r5:846eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84dd4ec0 INFO: task kworker/0:23:3318 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8669f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3620 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3620 tgid:3620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:84e68c00 r4:84e68c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84e68c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504c100 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0601000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501838c r4:85018000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501838c r4:84d2a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84e68c00 r8:84d2a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d2a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d2a800 r8:8027f5e8 r7:e0095e60 r6:847e8080 r5:84e68c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00bdfb0 to 0xe00bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84eb6540 INFO: task kworker/1:111:3620 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8669f000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3688 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0165d84 r8:00000002 r7:60000113 r6:e0165d8c r5:84f64800 r4:84f64800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f64800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0165e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fd3c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f64800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84f2438c r4:84f24000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f2438c r4:84ee2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f64800 r8:84ee21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ee2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ee2180 r8:8027f5e8 r7:e00bde60 r6:84ee2200 r5:84f64800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0165fb0 to 0xe0165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ecab40 INFO: task kworker/1:116:3688 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86a08000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:3719 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e00f9d84 r8:00000002 r7:60000013 r6:e00f9d8c r5:84f70000 r4:84f70000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f70000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faab40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff15000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea7b8c r4:84ea7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea7b8c r4:84fab200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70000 r8:84fab22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab200 r8:8027f5e8 r7:e04d9e60 r6:84fab280 r5:84f70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f9fb0 to 0xe00f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 INFO: task kworker/0:186:3719 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86d4c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:3724 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04e5d84 r8:00000002 r7:60000113 r6:e04e5d8c r5:84f71800 r4:84f71800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f71800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 INFO: task kworker/0:188:3724 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 86d4c000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3725 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04f1d84 r8:00000002 r7:60000113 r6:e04f1d8c r5:84f72400 r4:84f72400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f72400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 INFO: task kworker/0:189:3725 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8717b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3727 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3727 tgid:3727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:84f73000 r4:84f73000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f73000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f73000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea778c r4:84ea7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea778c r4:84fab600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f73000 r8:84fab62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab600 r8:8027f5e8 r7:e00f9e60 r6:84fab680 r5:84f73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faab00 INFO: task kworker/0:190:3727 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 8717b000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:3730 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84f73c00 r4:84f73c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f73c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faac00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0047000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea7f8c r4:84ea7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea7f8c r4:84fab700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f73c00 r8:84fab72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab700 r8:8027f5e8 r7:e00f9e60 r6:84fab780 r5:84f73c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa980 INFO: task kworker/0:191:3730 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 874d5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:3731 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:3731 tgid:3731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04fdd84 r8:00000002 r7:60000113 r6:e04fdd8c r5:84f74800 r4:84f74800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f74800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faae40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f74800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eac38c r4:84eac000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eac38c r4:84fab800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f74800 r8:84fab82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab800 r8:8027f5e8 r7:e04f9e60 r6:84fab880 r5:84f74800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04fdfb0 to 0xe04fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faac40 INFO: task kworker/0:192:3731 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 874d5000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3734 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0501d84 r8:00000002 r7:60000013 r6:e0501d8c r5:84f75400 r4:84f75400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f75400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f75400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ead38c r4:84ead000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ead38c r4:84fab900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f75400 r8:84fab92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab900 r8:8027f5e8 r7:e04fde60 r6:84fab980 r5:84f75400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0501fb0 to 0xe0501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faae00 INFO: task kworker/0:193:3734 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 87967000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3736 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:3736 tgid:3736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0509d84 r8:00000002 r7:60000113 r6:e0509d8c r5:84f76000 r4:84f76000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f76000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0509e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faaf00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f76000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eac78c r4:84eac400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eac78c r4:84faba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f76000 r8:84faba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84faba00 r8:8027f5e8 r7:e0501e60 r6:84faba80 r5:84f76000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0509fb0 to 0xe0509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84fb9100 INFO: task kworker/0:194:3736 is blocked on a mutex likely owned by task kworker/0:187:3720. task:kworker/0:187 state:R running task stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f70c00 r8:80200be4 r7:e04e9d5c r6:ffffffff r5:84f70c00 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e9d28 to 0xe04e9d70) 9d20: 87967000 eca73000 00000001 80239b98 7f185000 00000001 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da8 e04e9d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e9dc0 r5:e04e9e08 r4:e04e9dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6b8c r4:84ea6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6b8c r4:84fab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f70c00 r8:84fab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab300 r8:8027f5e8 r7:e00f9e60 r6:84fab380 r5:84f70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:3737 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04edd84 r8:00000002 r7:60000113 r6:e04edd8c r5:84f76c00 r4:84f76c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84f76c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fb9000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84eacb8c r4:84eac800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84eacb8c r4:84fabb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f76c00 r8:84fabb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fabb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fabb00 r8:8027f5e8 r7:e0501e60 r6:84fabb80 r5:84f76c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04edfb0 to 0xe04edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f185000 eca73000 8280c930 82ac11c4 e04e9da4 e04e9da <> preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed05de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0880 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f377000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7138c r4:85a71000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7138c r4:859b8180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a82400 r8:859b81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8180 r8:8027f5e8 r7:ed07de60 r6:859b8200 r5:85a82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b05c0 INFO: task kworker/1:470:6515 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d91ec000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:6518 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:6518 tgid:6518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed085d84 r8:00000002 r7:60000113 r6:ed085d8c r5:85a83000 r4:85a83000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a83000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed085e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0980 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f379000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed08d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7178c r4:85a71400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7178c r4:859b8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a83000 r8:859b82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8280 r8:8027f5e8 r7:ed05de60 r6:859b8300 r5:85a83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed085fb0 to 0xed085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0840 INFO: task kworker/1:471:6518 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d92cc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:6520 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed099d84 r8:00000002 r7:60000013 r6:ed099d8c r5:85a83c00 r4:85a83c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a83c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0b00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f37b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a71b8c r4:85a71800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a71b8c r4:859b8380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a83c00 r8:859b83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8380 r8:8027f5e8 r7:ed085e60 r6:859b8400 r5:85a83c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed099fb0 to 0xed099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0900 INFO: task kworker/1:472:6520 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9941000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:6521 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed091d84 r8:00000002 r7:60000013 r6:ed091d8c r5:85a84800 r4:85a84800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a84800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed091e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0cc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a71f8c r4:85a71c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a71f8c r4:859b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a84800 r8:859b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8480 r8:8027f5e8 r7:ed099e60 r6:859b8500 r5:85a84800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed091fb0 to 0xed091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0a40 INFO: task kworker/1:473:6521 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9941000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:85a85400 r4:8291892c [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:859b8580 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a5fb0 to 0xed0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859b0c80 INFO: task kworker/1:474:6523 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9a9a000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6525 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6525 tgid:6525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0b9d84 r8:00000002 r7:60000013 r6:ed0b9d8c r5:85a86000 r4:85a86000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a86000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0d80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f37f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7238c r4:85a72000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7238c r4:859b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a86000 r8:859b86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8680 r8:8027f5e8 r7:ed0a5e60 r6:859b8700 r5:85a86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0b9fb0 to 0xed0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847b98c0 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:6527 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:6527 tgid:6527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0add84 r8:00000002 r7:60000113 r6:ed0add8c r5:85a86c00 r4:85a86c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a86c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b9a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f381000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7278c r4:85a72400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7278c r4:859b8800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a86c00 r8:859b882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8800 r8:8027f5e8 r7:ed0a5e60 r6:859b8880 r5:85a86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0adfb0 to 0xed0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f040 INFO: task kworker/1:476:6527 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9f52000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:477:6529 blocked for more than 476 seconds. r4:85a98000 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: d9f52000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:6531 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:6531 tgid:6531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0cdd84 r8:00000002 r7:60000013 r6:ed0cdd8c r5:85a98c00 r4:85a98c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a98c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f38b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a73b8c r4:85a73800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a73b8c r4:859b8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a98c00 r8:859b89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8980 r8:8027f5e8 r7:ed0c1e60 r6:859b8a00 r5:85a98c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0cdfb0 to 0xed0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:6533 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:6533 tgid:6533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0d5d84 r8:00000002 r7:60000013 r6:ed0d5d8c r5:85a99800 r4:85a99800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a99800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f400 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a99800 r7:00000000 r6:83018200 r5:00001000 r4:7f387000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7338c r4:85a73000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a7338c r4:859b8b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a99800 r8:859b8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8b00 r8:8027f5e8 r7:ed0cde60 r6:859b8b80 r5:85a99800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d5fb0 to 0xed0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f240 INFO: task kworker/1:479:6533 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: da8b4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 INFO: task kworker/1:480:6534 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:ed0e1d84 r8:00000002 r7:60000013 r6:ed0e1d8c r5:85a9a400 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85a7378c r4:859b8a80 r4:859b8a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 r4:8597f240 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dade1000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:6538 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:6538 tgid:6538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0e9d84 r8:00000002 r7:60000113 r6:ed0e9d8c r5:85a9b000 r4:85a9b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a9b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f7c0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85a9bc00 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85ab878c r4:85ab8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:859b8d80 r8:8027f5e8 r7:ed0e9e60 r6:859b8e00 r5:85a9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0fdfb0 to 0xed0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f800 INFO: task kworker/1:482:6540 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: db357000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6542 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6542 tgid:6542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed109d84 r8:00000002 r7:60000113 r6:ed109d8c r5:85a9c800 r4:85a9c800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a9c800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f9c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85ab838c r4:859b8e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9c800 r8:859b8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859b8e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859b8e80 r8:8027f5e8 r7:ed0fde60 r6:859b8f00 r5:85a9c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f980 INFO: task kworker/1:483:6542 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: db5db000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597fc80 r7:ddde2d80 r6:83018200 r5:85ab8b8c r4:859b8f80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04e5d28 to 0xe04e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:485:6546 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:6546 tgid:6546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed111d84 r8:00000002 r7:60000013 r6:ed111d8c r5:85a9e000 r4:85a9e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a9e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d53c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f397000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed127000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab938c r4:85ab9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab938c r4:85254080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a9e000 r8:852540ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254080 r8:8027f5e8 r7:ed0f5e60 r6:85254100 r5:85a9e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597fbc0 INFO: task kworker/1:485:6546 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: db5db000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:486:6548 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r4:85a9ec00 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ab8f8c r4:85ab8c00 r10:61c88647 r9:85a9ec00 r8:852541ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85254180 r8:8027f5e8 r7:ed111e60 r6:85254200 r5:85a9ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed125fb0 to 0xed125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d5d00 INFO: task kworker/1:486:6548 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dbaf8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:6549 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:6549 tgid:6549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed11dd84 r8:00000002 r7:60000013 r6:ed11dd8c r5:85a90000 r4:85a90000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a90000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed11de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f399000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab978c r4:85ab9400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab978c r4:85254280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a90000 r8:852542ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254280 r8:8027f5e8 r7:ed111e60 r6:85254300 r5:85a90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed11dfb0 to 0xed11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85265080 INFO: task kworker/1:487:6549 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dbaf8000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:6551 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:6551 tgid:6551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed139d84 r8:00000002 r7:60000013 r6:ed139d8c r5:85a91800 r4:85a91800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r5:00001000 r4:dfecf000 r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:6552 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:6552 tgid:6552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed131d84 r8:00000002 r7:60000013 r6:ed131d8c r5:85a92400 r4:85a92400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a92400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed131e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f39b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed13b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab9b8c r4:85ab9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ab9b8c r4:85254480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a92400 r8:852544ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254480 r8:8027f5e8 r7:ed139e60 r6:85254500 r5:85a92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85265340 INFO: task kworker/1:489:6552 is blocked on a mutex likely owned by task kworker/0:188:3724. r4:00000000 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed179000 r10:61c88647 r9:85a90c00 r8:852545ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85265440 Call trace: 5d60: 80230ad4 80239bb0 800f0013 ffffffff r4:e04e5dc0 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:6559 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:6559 tgid:6559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed14dd84 r8:00000002 r7:60000013 r6:ed14dd8c r5:85a93c00 r4:85a93c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a93c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed155000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aba78c r4:85aba400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aba78c r4:85254680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a93c00 r8:852546ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254680 r8:8027f5e8 r7:ed145e60 r6:85254700 r5:85a93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852656c0 INFO: task kworker/1:491:6559 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dc167000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:84ea6f8c r4:84ea6c00 r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:84faa640 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:6561 tgid:6561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed171d84 r8:00000002 r7:60000013 r6:ed171d8c r5:85a94800 r4:85a94800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a94800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed171e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f3a3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed15f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abab8c r4:85aba800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abab8c r4:85254780 r10:61c88647 r9:85a94800 r8:852547ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa640 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed165000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:6564 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:6564 tgid:6564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed17dd84 r8:00000002 r7:60000013 r6:ed17dd8c r5:85a96c00 r4:85a96c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a96c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed17de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265ac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed173000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abb38c r4:85abb000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abb38c r4:85254980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a96c00 r8:852549ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254980 r8:8027f5e8 r7:ed145e60 r6:85254a00 r5:85a96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed17dfb0 to 0xed17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852659c0 INFO: task kworker/1:494:6564 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dc842000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:6566 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:6566 tgid:6566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:85aa0000 r4:85aa0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85abbb8c r4:85254a80 r4:85254a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254a80 r8:8027f5e8 r7:ed145e60 r6:85254b00 r5:85aa0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852659c0 INFO: task kworker/1:495:6566 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dc842000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85254b80 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:6572 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:6572 tgid:6572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1b9d84 r8:00000002 r7:60000113 r6:ed1b9d8c r5:85aa1800 r4:85aa1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524a640 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa1800 r7:00000000 r6:83018200 r5:00001000 r4:7f3b5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abbf8c r4:85abbc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85abbf8c r4:85254c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa1800 r8:85254cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85254c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254c80 r8:8027f5e8 r7:ed199e60 r6:85254d00 r5:85aa1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b9fb0 to 0xed1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a4c0 INFO: task kworker/1:497:6572 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04e5d28 to 0xe04e5d70) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfba1000 r10:61c88647 r9:85aa3000 r8:85254dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a600 INFO: task kworker/1:498:6575 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dcfa4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:6583 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:6583 tgid:6583 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8524a880 [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ea6f8c r4:84ea6c00 r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85254f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85254f80 r8:8027f5e8 r7:ed15de60 r6:8525a000 r5:85aa4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed195fb0 to 0xed195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a880 INFO: task kworker/1:500:6584 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dd7b5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:6586 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:6586 tgid:6586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac0b8c r4:85ac0800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac0b8c r4:8525a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa5400 r8:8525a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a080 r8:8027f5e8 r7:ed15de60 r6:8525a100 r5:85aa5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c5fb0 to 0xed1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a880 INFO: task kworker/1:501:6586 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dd7b5000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:6608 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:6608 tgid:6608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1d5d84 r8:00000002 r7:60000113 r6:ed1d5d8c r5:85aa6c00 r4:85aa6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f92c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f339000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf63000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2df8c r4:85a2dc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2df8c r4:8525a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa6c00 r8:8525a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a180 r8:8027f5e8 r7:ed1c5e60 r6:8525a200 r5:85aa6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1d5fb0 to 0xed1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524af40 INFO: task kworker/1:502:6608 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ddb42000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:503:6613 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:503 state:D stack:0 pid:6613 tgid:6613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1c1d84 r8:00000002 r7:60000113 r6:ed1c1d8c r5:85aa6000 r4:85aa6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524a340 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa6000 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac0f8c r4:85ac0c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac0f8c r4:8525a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa6000 r8:8525a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a280 r8:8027f5e8 r7:ed1c5e60 r6:8525a300 r5:85aa6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524af00 INFO: task kworker/1:503:6613 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de005000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:6617 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:6617 tgid:6617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1ddd84 r8:00000002 r7:60000113 r6:ed1ddd8c r5:85aa0c00 r4:85aa0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3a1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ef000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac1f8c r4:85ac1c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac1f8c r4:8525a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa0c00 r8:8525a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a380 r8:8027f5e8 r7:ed1c1e60 r6:8525a400 r5:85aa0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1ddfb0 to 0xed1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523fec0 INFO: task kworker/1:504:6617 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de273000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:6619 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:6619 tgid:6619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1c9d84 r8:00000002 r7:60000113 r6:ed1c9d8c r5:85a93000 r4:85a93000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a93000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591acc0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a36b8c r4:85a36800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a36b8c r4:8525a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a93000 r8:8525a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a480 r8:8027f5e8 r7:ed1dde60 r6:8525a500 r5:85a93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524a300 INFO: task kworker/1:505:6619 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de39f000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:6664 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:6664 tgid:6664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed23dd84 r8:00000002 r7:60000113 r6:ed23dd8c r5:855b3000 r4:855b3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed23de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8240 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac1b8c r4:85ac1800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac1b8c r4:8525a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:8525a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a580 r8:8027f5e8 r7:ed1dde60 r6:8525a600 r5:855b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed23dfb0 to 0xed23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a7640 INFO: task kworker/1:506:6664 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de6fc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:6678 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:6678 tgid:6678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed21dd84 r8:00000002 r7:60000113 r6:ed21dd8c r5:855b0000 r4:855b0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed21de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f3b9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac278c r4:85ac2400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac278c r4:8525a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0000 r8:8525a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a680 r8:8027f5e8 r7:ed1dde60 r6:8525a700 r5:855b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed21dfb0 to 0xed21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c83c0 INFO: task kworker/1:507:6678 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de6fc000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:6680 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:6680 tgid:6680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1fdd84 r8:00000002 r7:60000113 r6:ed1fdd8c r5:855b3c00 r4:855b3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c86c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3b7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec877000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac238c r4:85ac2000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac238c r4:8525a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:8525a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a780 r8:8027f5e8 r7:ed21de60 r6:8525a800 r5:855b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1fdfb0 to 0xed1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c83c0 INFO: task kworker/1:508:6680 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: de97b000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:6691 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:6691 tgid:6691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec855d84 r8:00000002 r7:60000113 r6:ec855d8c r5:855b4800 r4:855b4800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac2b8c r4:85ac2800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac2b8c r4:8525a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b4800 r8:8525a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a880 r8:8027f5e8 r7:ed21de60 r6:8525a900 r5:855b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8780 INFO: task kworker/1:509:6691 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ded98000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:6695 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:6695 tgid:6695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:855b5400 r4:855b5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f37d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac338c r4:85ac3000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac338c r4:8525a980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:8525a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525a980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a980 r8:8027f5e8 r7:ec855e60 r6:8525aa00 r5:855b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec891fb0 to 0xec891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8880 INFO: task kworker/1:510:6695 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: ded98000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:6697 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:6697 tgid:6697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec881d84 r8:00000002 r7:60000113 r6:ec881d8c r5:855b6000 r4:855b6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f3e3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec947000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac378c r4:85ac3400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac378c r4:8525aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6000 r8:8525aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525aa80 r8:8027f5e8 r7:ec891e60 r6:8525ab00 r5:855b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8880 INFO: task kworker/1:511:6697 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df1a4000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:6716 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:512 state:D stack:0 pid:6716 tgid:6716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec989d84 r8:00000002 r7:60000113 r6:ec989d8c r5:855b0c00 r4:855b0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ca800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3e5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec991000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac3b8c r4:85ac3800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ac3b8c r4:8525ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:8525abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ab80 r8:8027f5e8 r7:ec881e60 r6:8525ac00 r5:855b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ca780 INFO: task kworker/1:512:6716 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df467000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:6717 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec959d84 r8:00000002 r7:60000113 r6:ec959d8c r5:855b2400 r4:855b2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859e2380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3538c r4:85b35000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b3538c r4:8525ac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:8525acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ac80 r8:8027f5e8 r7:ec989e60 r6:8525ad00 r5:855b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859ca780 INFO: task kworker/1:513:6717 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df467000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:6742 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:6742 tgid:6742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:85a95400 r4:85a95400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a95400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35900 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a95400 r7:00000000 r6:83018200 r5:00001000 r4:7f6ef000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed071000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d60b8c r4:84d60800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d60b8c r4:8525ad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a95400 r8:8525adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ad80 r8:8027f5e8 r7:ec959e60 r6:8525ae00 r5:85a95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859cac80 INFO: task kworker/1:514:6742 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: df467000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:6768 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:6768 tgid:6768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecdb1d84 r8:00000002 r7:60000113 r6:ecdb1d8c r5:855c3000 r4:855c3000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c3000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35840 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f6ed000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d60f8c r4:84d60c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d60f8c r4:8525ae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3000 r8:8525aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525ae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ae80 r8:8027f5e8 r7:ecb21e60 r6:8525af00 r5:855c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859d6540 INFO: task kworker/1:515:6768 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dfa67000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:7127 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:7127 tgid:7127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed50dd84 r8:00000002 r7:60000113 r6:ed50dd8c r5:855c2400 r4:855c2400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c2400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed50de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35c80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f6f3000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d6038c r4:84d60000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d6038c r4:8525af80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c2400 r8:8525afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8525af80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525af80 r8:8027f5e8 r7:ecb21e60 r6:8476a000 r5:855c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed50dfb0 to 0xed50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35740 INFO: task kworker/1:516:7127 is blocked on a mutex likely owned by task kworker/0:188:3724. task:kworker/0:188 state:R running task stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f71800 r8:80200be4 r7:e04e5d5c r6:ffffffff r5:84f71800 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04e5d28 to 0xe04e5d70) 5d20: dfd3d000 dfe5f000 00000001 80239b98 7f1e3000 00000001 5d40: 82ac05a0 7f1e3000 dfe5f000 8280c930 82ac11c4 e04e5da4 e04e5da8 e04e5d78 5d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04e5dc0 r5:e04e5e08 r4:e04e5dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea6f8c r4:84ea6c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea6f8c r4:84fab400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f71800 r8:84fab42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab400 r8:8027f5e8 r7:e00f9e60 r6:84fab480 r5:84f71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa640 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:7130 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:7130 tgid:7130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed629d84 r8:00000002 r7:60000113 r6:ed629d8c r5:855c3c00 r4:855c3c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c3c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed629e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6f1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d6078c r4:84d60400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d6078c r4:8476a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3c00 r8:8476a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a080 r8:8027f5e8 r7:ed50de60 r6:8476a100 r5:855c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed629fb0 to 0xed629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35a80 INFO: task kworker/1:517:7130 is blocked on a mutex, but the owner is not found. Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:7132 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:7132 tgid:7132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed62dd84 r8:00000002 r7:60000113 r6:ed62dd8c r5:855c0c00 r4:855c0c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c0c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed62de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e23600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6f7000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed149000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4fb8c r4:84d4f800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4fb8c r4:8476a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:8476a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a180 r8:8027f5e8 r7:ed50de60 r6:8476a200 r5:855c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed62dfb0 to 0xed62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35c40 INFO: task kworker/1:518:7132 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 7f68d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 900e0013 ffffffff r5:900e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:7133 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:7133 tgid:7133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3f5d84 r8:00000002 r7:60000013 r6:ed3f5d8c r5:855c0000 r4:855c0000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c0000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e35e40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f6f5000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed115000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4ff8c r4:84d4fc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4ff8c r4:8476a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0000 r8:8476a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a280 r8:8027f5e8 r7:ed62de60 r6:8476a300 r5:855c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f5fb0 to 0xed3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84e35c40 INFO: task kworker/1:519:7133 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 7f68d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 900e0013 ffffffff r5:900e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:7136 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:7136 tgid:7136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed639d84 r8:00000002 r7:60000013 r6:ed639d8c r5:855c1800 r4:855c1800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c1800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed639e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705040 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f6f9000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d4f78c r4:84d4f400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d4f78c r4:8476a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c1800 r8:8476a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a380 r8:8027f5e8 r7:ed62de60 r6:8476a400 r5:855c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed639fb0 to 0xed639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705100 INFO: task kworker/1:520:7136 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:7138 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:7138 tgid:7138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed641d84 r8:00000002 r7:60000013 r6:ed641d8c r5:8551ec00 r4:8551ec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551ec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed641e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f6fb000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed19d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad438c r4:85ad4000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad438c r4:8476a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551ec00 r8:8476a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:e04f1dc0 r5:00001000 r4:dfee5000 r4:84fab500 Exception stack(0xe04f1fb0 to 0xe04f1ff8) r4:84faa7c0 Workqueue: events bpf_prog_free_deferred [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705380 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6fd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1bd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad478c r4:85ad4400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad478c r4:8476a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6c00 r8:8476a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a500 r8:8027f5e8 r7:ed641e60 r6:8476a580 r5:855c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed635fb0 to 0xed635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705100 INFO: task kworker/1:522:7140 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 7f8f8000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 900e0013 ffffffff r5:900e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:7143 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:7143 tgid:7143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed649d84 r8:00000002 r7:60000013 r6:ed649d8c r5:855c5400 r4:855c5400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c5400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed649e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f6ff000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85ad4b8c r4:8476a600 r10:00000000 r9:8476a600 r8:8027f5e8 r7:ed635e60 r6:8476a680 r5:855c5400 INFO: task kworker/1:523:7143 is blocked on a mutex likely owned by task kworker/0:189:3725. 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:7144 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:7144 tgid:7144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed64dd84 r8:00000002 r7:60000113 r6:ed64dd8c r5:855c6000 r4:855c6000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c6000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed64de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857055c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f701000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed423000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad4f8c r4:85ad4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad4f8c r4:8476a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6000 r8:8476a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a700 r8:8027f5e8 r7:ed649e60 r6:8476a780 r5:855c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed64dfb0 to 0xed64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705780 INFO: task kworker/1:524:7144 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad4 80239bb0 900e0013 ffffffff r4:e04f1dc0 r5:00001000 r4:dfee5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:525 state:D stack:0 pid:7147 tgid:7147 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c4800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed651e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857059c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f705000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed435000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad578c r4:85ad5400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad578c r4:8476a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c4800 r8:8476a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a800 r8:8027f5e8 r7:ed64de60 r6:8476a880 r5:855c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed651fb0 to 0xed651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705600 INFO: task kworker/1:525:7147 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80188000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:7148 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:7148 tgid:7148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed63dd84 r8:00000002 r7:60000113 r6:ed63dd8c r5:855b6c00 r4:855b6c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed63de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705800 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed42b000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa7c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855b1800 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed655e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705e00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f70b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed44f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad638c r4:85ad6000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad638c r4:8476aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:8476aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476aa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476aa00 r8:8027f5e8 r7:ed651e60 r6:8476aa80 r5:855b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed655fb0 to 0xed655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705980 INFO: task kworker/1:527:7151 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 804f2000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:7152 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:7152 tgid:7152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed659d84 r8:00000002 r7:60000013 r6:ed659d8c r5:85aa8000 r4:85aa8000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa8000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed659e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705a80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa8000 r7:00000000 r6:83018200 r5:00001000 r4:7f707000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed43d000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad5b8c r4:85ad5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad5b8c r4:8476ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa8000 r8:8476ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ab00 r8:8027f5e8 r7:ed655e60 r6:8476ab80 r5:85aa8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed659fb0 to 0xed659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705ac0 INFO: task kworker/1:528:7152 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 807e0000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:7154 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:7154 tgid:7154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed65dd84 r8:00000002 r7:60000013 r6:ed65dd8c r5:85aa8c00 r4:85aa8c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa8c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed65de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705d00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f709000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed447000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad5f8c r4:85ad5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad5f8c r4:8476ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa8c00 r8:8476ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ac00 r8:8027f5e8 r7:ed655e60 r6:8476ac80 r5:85aa8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed65dfb0 to 0xed65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705cc0 INFO: task kworker/1:529:7154 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80b5d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:7156 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:7156 tgid:7156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed661d84 r8:00000002 r7:60000113 r6:ed661d8c r5:85aa9800 r4:85aa9800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa9800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed661e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85705f80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f70d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed459000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad678c r4:85ad6400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad678c r4:8476ad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa9800 r8:8476ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ad00 r8:8027f5e8 r7:ed655e60 r6:8476ad80 r5:85aa9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed661fb0 to 0xed661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85705d80 INFO: task kworker/1:530:7156 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80b5d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:84faa7c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85aaa400 [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed665e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f70f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed465000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad6b8c r4:85ad6800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad6b8c r4:8476ae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaa400 r8:8476ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476ae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ae00 r8:8027f5e8 r7:ed661e60 r6:8476ae80 r5:85aaa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed665fb0 to 0xed665ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:83afefc0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac11e4 r4:00000000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84fab500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:532 state:D stack:0 pid:7161 tgid:7161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed669d84 r8:00000002 r7:60000113 r6:ed669d8c r5:85aab000 r4:85aab000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aab000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed669e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf600 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aab000 r7:00000000 r6:83018200 r5:00001000 r4:7f717000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4a1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad7b8c r4:85ad7800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad7b8c r4:8476af00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aab000 r8:8476af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8476af00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476af00 r8:8027f5e8 r7:ed665e60 r6:8476af80 r5:85aab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed669fb0 to 0xed669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf280 INFO: task kworker/1:532:7161 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 80ec8000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:7163 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:7163 tgid:7163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed679d84 r8:00000002 r7:60000113 r6:ed679d8c r5:8551c800 r5:8551c800 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed477000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85bc9000 r8:8027f5e8 r7:ed669e60 r6:859b4100 r5:8551c800 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81102000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:7164 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:7164 tgid:7164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed67dd84 r8:00000002 r7:60000113 r6:ed67dd8c r5:8551e000 r4:8551e000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551e000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed67de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551e000 r7:00000000 r6:83018200 r5:00001000 r4:7f713000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed483000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad738c r4:85ad7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad738c r4:85bc9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551e000 r8:85bc90ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9080 r8:8027f5e8 r7:ed669e60 r6:859b4180 r5:8551e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed67dfb0 to 0xed67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf2c0 INFO: task kworker/1:534:7164 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84faa7c0 Not tainted 6.15.0-syzkaller #0 task:kworker/1:535 state:D stack:0 pid:7166 tgid:7166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed681d84 r8:00000002 r7:60000013 r6:ed681d8c r5:8551b000 r4:8551b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed681e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551b000 r7:00000000 r6:83018200 r5:00001000 r4:7f715000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed495000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad778c r4:85ad7400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad778c r4:85bc9100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551b000 r8:85bc912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9100 r8:8027f5e8 r7:ed669e60 r6:859b4200 r5:8551b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed681fb0 to 0xed681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf3c0 INFO: task kworker/1:535:7166 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 813e1000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:7168 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:7168 tgid:7168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed689d84 r8:00000002 r7:60000113 r6:ed689d8c r5:83243c00 r4:83243c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83243c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed689e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf800 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f71b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed697000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adc38c r4:85adc000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc38c r4:85bc9180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83243c00 r8:85bc91ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9180 r8:8027f5e8 r7:ed669e60 r6:859b4280 r5:83243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed689fb0 to 0xed689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf540 INFO: task kworker/1:536:7168 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81a5a000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:7169 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:7169 tgid:7169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed68dd84 r8:00000002 r7:60000113 r6:ed68dd8c r5:85404800 r4:85404800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85404800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed68de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcf6c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f719000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4ab000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad7f8c r4:85ad7c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ad7f8c r4:85bc9200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85404800 r8:85bc922c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9200 r8:8027f5e8 r7:ed689e60 r6:859b4300 r5:85404800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed68dfb0 to 0xed68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf540 INFO: task kworker/1:537:7169 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81a5a000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:7171 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:7171 tgid:7171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed695d84 r8:00000002 r7:60000013 r6:ed695d8c r5:84d78c00 r4:84d78c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d78c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed695e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfa00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f603000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adc78c r4:85adc400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc78c r4:85bc9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d78c00 r8:85bc92ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9280 r8:8027f5e8 r7:ed689e60 r6:859b4380 r5:84d78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed695fb0 to 0xed695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf700 INFO: task kworker/1:538:7171 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81b10000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:7174 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:7174 tgid:7174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed5d9d84 r8:00000002 r7:60000113 r6:ed5d9d8c r5:84d79800 r4:84d79800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d79800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfac0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d79800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adcb8c r4:85adc800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcb8c r4:85bc9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d79800 r8:85bc932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9300 r8:8027f5e8 r7:ed695e60 r6:859b4400 r5:84d79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5d9fb0 to 0xed5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcf9c0 INFO: task kworker/1:539:7174 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 81f24000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:7176 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:7176 tgid:7176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed5ddd84 r8:00000002 r7:60000013 r6:ed5ddd8c r5:84d7a400 r4:84d7a400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7a400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5dde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfc00 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4af000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adcf8c r4:85adcc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcf8c r4:85bc9380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d7a400 r8:85bc93ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9380 r8:8027f5e8 r7:ed5d9e60 r6:859b4480 r5:84d7a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5ddfb0 to 0xed5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfb00 INFO: task kworker/1:540:7176 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 82155000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:7178 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:7178 tgid:7178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6a1d84 r8:00000002 r7:60000013 r6:ed6a1d8c r5:84d7b000 r4:84d7b000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7b000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6a1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfd40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f6cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85add38c r4:85add000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add38c r4:85bc9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d7b000 r8:85bc942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9400 r8:8027f5e8 r7:ed5dde60 r6:859b4500 r5:84d7b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6a1fb0 to 0xed6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfb40 INFO: task kworker/1:541:7178 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 8242a000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:7180 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:7180 tgid:7180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6a5d84 r8:00000002 r7:60000113 r6:ed6a5d8c r5:84d7bc00 r4:84d7bc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d7bc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4eb000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85addf8c r4:85bc9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d7bc00 r8:85bc94ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9480 r8:8027f5e8 r7:ed6a1e60 r6:859b4580 r5:84d7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6a5fb0 to 0xed6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfd80 INFO: task kworker/1:542:7180 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 828a3000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:7181 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:7181 tgid:7181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed675d84 r8:00000002 r7:60000013 r6:ed675d8c r5:85aae000 r4:85aae000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aae000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bcfe80 r9:83018205 r8:85aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f6d1000 r5:00001000 r4:ed4c1000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add78c r4:85bc9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aae000 r8:85bc952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9500 r8:8027f5e8 r7:ed6a5e60 r6:85bc9580 r5:85aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bcfec0 INFO: task kworker/1:543:7181 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 828a3000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:544:7183 blocked for more than 478 seconds. r4:85aac800 r4:00000000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4cd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85bc9600 Exception stack(0xed691fb0 to 0xed691ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:7187 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:7187 tgid:7187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6a9d84 r8:00000002 r7:60000013 r6:ed6a9d8c r5:85aaec00 r4:85aaec00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aaec00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6a9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf3c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aaec00 r7:00000000 r6:83018200 r5:00001000 r4:7f723000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4fd000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ade38c r4:85ade000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade38c r4:85bc9700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaec00 r8:85bc972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed6a9fb0 to 0xed6a9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:7189 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:7189 tgid:7189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed66dd84 r8:00000002 r7:60000013 r6:ed66dd8c r5:85aad400 r4:85aad400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aad400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf5c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aad400 r7:00000000 r6:83018200 r5:00001000 r4:7f725000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed509000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ade78c r4:85ade400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade78c r4:85bc9800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aad400 r8:85bc982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9800 r8:8027f5e8 r7:ed6a9e60 r6:85bc9880 r5:85aad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed66dfb0 to 0xed66dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:7191 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:7191 tgid:7191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6add84 r8:00000002 r7:60000013 r6:ed6add8c r5:85aabc00 r4:85aabc00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aabc00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ade08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf8c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aabc00 r7:00000000 r6:83018200 r5:00001000 r4:7f729000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed51f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adef8c r4:85adec00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adef8c r4:85bc9900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aabc00 r8:85bc992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9900 r8:8027f5e8 r7:ed66de60 r6:85bc9980 r5:85aabc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6adfb0 to 0xed6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bbf500 INFO: task kworker/1:547:7191 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 82fd2000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:7193 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:7193 tgid:7193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6b1d84 r8:00000002 r7:60000113 r6:ed6b1d8c r5:84690000 r4:84690000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84690000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbf680 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84690000 r7:00000000 r6:83018200 r5:00001000 r4:7f727000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed517000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adeb8c r4:85ade800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adeb8c r4:85bc9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84690000 r8:85bc9a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9a00 r8:8027f5e8 r7:ed6ade60 r6:85bc9a80 r5:84690000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b1fb0 to 0xed6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:7195 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:7195 tgid:7195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6b5d84 r8:00000002 r7:60000113 r6:ed6b5d8c r5:84690c00 r4:84690c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84690c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbfb80 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84690c00 r7:00000000 r6:83018200 r5:00001000 r4:7f72d000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed531000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adf78c r4:85adf400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adf78c r4:85bc9b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84690c00 r8:85bc9b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9b00 r8:8027f5e8 r7:ed6ade60 r6:85bc9b80 r5:84690c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6b5fb0 to 0xed6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85bbf880 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:550 state:D stack:0 pid:7197 tgid:7197 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed529000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed6b9fb0 to 0xed6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bbf9c0 INFO: task kworker/1:550:7197 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 835be000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:7199 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:7199 tgid:7199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6bdd84 r8:00000002 r7:60000013 r6:ed6bdd8c r5:84692400 r4:84692400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84692400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6bde08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed53b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85bc9d00 r8:8027f5e8 r7:ed6b5e60 r6:85bc9d80 r5:84692400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad4 80239bb0 800e0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:7201 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:7201 tgid:7201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6c1d84 r8:00000002 r7:60000113 r6:ed6c1d8c r5:84693000 r4:84693000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84693000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2000 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84693000 r7:00000000 r6:83018200 r5:00001000 r4:7f735000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed555000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae878c r4:85ae8400 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae878c r4:85bc9e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84693000 r8:85bc9e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc9e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc9e00 r8:8027f5e8 r7:ed6bde60 r6:85bc9e80 r5:84693000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c1fb0 to 0xed6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bbfd00 INFO: task kworker/1:552:7201 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 83b44000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:84693c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbfec0 r5:00001000 r4:ed543000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85adff8c r4:85bc9f00 r4:85bc9f00 Exception stack(0xed6c5fb0 to 0xed6c5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04f1d28 to 0xe04f1d70) 1d60: 80230ad4 80239bb0 800e0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe04f1fb0 to 0xe04f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:554 state:D stack:0 pid:7206 tgid:7206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6c9d84 r8:00000002 r7:60000013 r6:ed6c9d8c r5:84694800 r4:84694800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84694800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2480 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84694800 r7:00000000 r6:83018200 r5:00001000 r4:7f73b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed571000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae938c r4:85ae9000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae938c r4:85bb5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84694800 r8:85bb502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5000 r8:8027f5e8 r7:ed6c1e60 r6:85bb5080 r5:84694800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c9fb0 to 0xed6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb20c0 INFO: task kworker/1:554:7206 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 83ee7000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:555 state:D stack:0 pid:7208 tgid:7208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6cdd84 r8:00000002 r7:60000013 r6:ed6cdd8c r5:84695400 r4:84695400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84695400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6cde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb21c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84695400 r7:00000000 r6:83018200 r5:00001000 r4:7f737000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed55f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae8b8c r4:85ae8800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae8b8c r4:85bb5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84695400 r8:85bb512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5100 r8:8027f5e8 r7:ed6c9e60 r6:85bb5180 r5:84695400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6cdfb0 to 0xed6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2180 INFO: task kworker/1:555:7208 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 841c4000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:7210 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:7210 tgid:7210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6d5d84 r8:00000002 r7:60000013 r6:ed6d5d8c r5:84696000 r4:84696000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84696000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2280 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84696000 r7:00000000 r6:83018200 r5:00001000 r4:7f739000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed567000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae8f8c r4:85ae8c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae8f8c r4:85bb5200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84696000 r8:85bb522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5200 r8:8027f5e8 r7:ed6c9e60 r6:85bb5280 r5:84696000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d5fb0 to 0xed6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb22c0 INFO: task kworker/1:556:7210 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 84337000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:7212 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:7212 tgid:7212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6d1d84 r8:00000002 r7:60000013 r6:ed6d1d8c r5:85c10000 r4:85c10000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c10000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2600 r5:00001000 r4:ed579000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85c10000 r8:85bb532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb2680 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:7214 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:7214 tgid:7214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed585d84 r8:00000002 r7:60000013 r6:ed585d8c r5:85c10c00 r4:85c10c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c10c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed585e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb28c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f73f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed589000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae9b8c r4:85ae9800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed585fb0 to 0xed585ff8) task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:559:7216 blocked for more than 479 seconds. task:kworker/1:559 state:D stack:0 pid:7216 tgid:7216 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85c12400 r5:85c12400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2c40 r5:00001000 r4:ed59b000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aea38c r4:85bb5500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c12400 r8:85bb552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5500 r8:8027f5e8 r7:ed585e60 r6:85bb5580 r5:85c12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6ddfb0 to 0xed6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb23c0 INFO: task kworker/1:559:7216 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 84803000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:7219 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:7219 tgid:7219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6e1d84 r8:00000002 r7:60000113 r6:ed6e1d8c r5:85c14800 r4:85c14800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c14800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e1e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2a40 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c14800 r7:00000000 r6:83018200 r5:00001000 r4:7f741000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed591000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae9f8c r4:85ae9c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae9f8c r4:85bb5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c14800 r8:85bb562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5600 r8:8027f5e8 r7:ed6dde60 r6:85bb5680 r5:85c14800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2980 INFO: task kworker/1:560:7219 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 84bc7000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 Not tainted 6.15.0-syzkaller #0 r5:85c13000 r4:8291892c [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed5a3000 r5:85aea78c r4:85aea400 r10:61c88647 r9:85c13000 r8:85bb572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe04f1d28 to 0xe04f1d70) r4:82ac11e4 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:7222 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:7222 tgid:7222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6d9d84 r8:00000002 r7:60000113 r6:ed6d9d8c r5:85c11800 r4:85c11800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c11800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d9e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba5940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c11800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed41f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aebb8c r4:85aeb800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aebb8c r4:85bb5800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c11800 r8:85bb582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5800 r8:8027f5e8 r7:ed6e5e60 r6:85bb5880 r5:85c11800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d9fb0 to 0xed6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2ec0 INFO: task kworker/1:562:7222 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84faa7c0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6ede08 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bb2f00 INFO: task kworker/1:563:7224 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 855c7000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:7230 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85c16c00 r4:00000000 r9:83018205 r8:85c16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f74b000 r5:00001000 r4:ed5bf000 r5:85aeb38c r4:85aeb000 r4:85bb5a00 Exception stack(0xed5f1fb0 to 0xed5f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ed621d84 r8:00000002 r7:60000113 r6:ed621d8c r5:85c13c00 [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba54c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c13c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aebf8c r4:85aebc00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aebf8c r4:85bb5b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c13c00 r8:85bb5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5b00 r8:8027f5e8 r7:ed6d9e60 r6:85bb5b80 r5:85c13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed621fb0 to 0xed621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ba5ac0 INFO: task kworker/1:565:7257 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 85a44000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:7259 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:7259 tgid:7259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed69dd84 r8:00000002 r7:60000013 r6:ed69dd8c r5:85c15400 r4:85c15400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c15400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed69de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc03c0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c15400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cf000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4c3000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84d61f8c r4:84d61c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84d61f8c r4:85bb5c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c15400 r8:85bb5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb5c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bb5c00 r8:8027f5e8 r7:ed621e60 r6:85bb5c80 r5:85c15400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed69dfb0 to 0xed69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ba5780 INFO: task kworker/1:566:7259 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 85a44000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:7261 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:7261 tgid:7261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6f5d84 r8:00000002 r7:60000113 r6:ed6f5d8c r5:84696c00 r4:84696c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84696c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f5e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bb2ec0 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84696c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d1000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d7000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84696c00 r8:85bb5d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bb2f00 r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:82ac11e4 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:568:7263 blocked for more than 479 seconds. r4:85c20000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f1e08 r5:00001000 r4:ed4f3000 r5:857c478c r4:857c4400 r10:61c88647 r9:85c20000 r8:85bb5e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed6f1fb0 to 0xed6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ba51c0 INFO: task kworker/1:568:7263 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86069000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:7266 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:7266 tgid:7266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed535000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85c20c00 r8:85bb5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 r4:00000000 [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:570:7268 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r4:85c21800 [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed507000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857c4b8c r4:857c4800 r7:ddde2d80 r6:83018200 r5:857c4b8c r4:85bc8000 r10:61c88647 r9:85c21800 r8:85bc802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8000 r8:8027f5e8 r7:ed6f9e60 r6:85bc8080 r5:85c21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed705fb0 to 0xed705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2140 INFO: task kworker/1:570:7268 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86428000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:7269 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:7269 tgid:7269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed6fdd84 r8:00000002 r7:60000113 r6:ed6fdd8c r5:85c22400 r4:85c22400 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c22400 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6fde08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2300 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c22400 r7:00000000 r6:83018200 r5:00001000 r4:7f709000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed519000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c4f8c r4:857c4c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c4f8c r4:85bc8100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c22400 r8:85bc812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8100 r8:8027f5e8 r7:ed6f9e60 r6:85bc8180 r5:85c22400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6fdfb0 to 0xed6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2140 INFO: task kworker/1:571:7269 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86428000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:7271 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:7271 tgid:7271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed709d84 r8:00000002 r7:60000113 r6:ed709d8c r5:85c23000 r4:85c23000 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23000 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed709e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2500 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c23000 r7:00000000 r6:83018200 r5:00001000 r4:7f70b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed525000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c538c r4:857c5000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c538c r4:85bc8200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23000 r8:85bc822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8200 r8:8027f5e8 r7:ed6f9e60 r6:85bc8280 r5:85c23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed709fb0 to 0xed709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc24c0 INFO: task kworker/1:572:7271 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 868fc000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:7274 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:7274 tgid:7274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed70dd84 r8:00000002 r7:60000113 r6:ed70dd8c r5:85c23c00 r4:85c23c00 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c23c00 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed70de08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2940 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f711000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed54f000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c5f8c r4:857c5c00 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c5f8c r4:85bc8300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c23c00 r8:85bc832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8300 r8:8027f5e8 r7:ed6f9e60 r6:85bc8380 r5:85c23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed70dfb0 to 0xed70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2600 INFO: task kworker/1:573:7274 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86c3d000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d40: 82ac05a0 7f1e5000 dfe9d000 8280c930 82ac11c4 e04f1da4 e04f1da8 e04f1d78 1d60: 80230ad4 80239bb0 800e0013 ffffffff r5:800e0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3c5c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3a4c>] (__purge_vmap_area_lazy) from [<804e4004>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04f1dc0 r5:e04f1e08 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84f72400 r8:84fab52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84fab500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fab500 r8:8027f5e8 r7:e00f9e60 r6:84fab580 r5:84f72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84faa7c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:7275 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:7275 tgid:7275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63a5c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62ad4>] (__schedule) from [<81a63a5c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed711d84 r8:00000002 r7:60000013 r6:ed711d8c r5:85c24800 r4:85c24800 [<81a63a30>] (schedule) from [<81a63e44>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c24800 r4:8291892c [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a63e2c>] (schedule_preempt_disabled) from [<81a66528>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66228>] (__mutex_lock.constprop.0) from [<81a669f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed711e08 r4:00000000 [<81a669e0>] (__mutex_lock_slowpath) from [<81a66a34>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a669f8>] (mutex_lock) from [<804e3e88>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bc2700 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c24800 r7:00000000 r6:83018200 r5:00001000 r4:7f70f000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed541000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c5b8c r4:857c5800 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c5b8c r4:85bc8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c24800 r8:85bc842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85bc8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85bc8400 r8:8027f5e8 r7:ed70de60 r6:85bc8480 r5:85c24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed711fb0 to 0xed711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85bc2740 INFO: task kworker/1:574:7275 is blocked on a mutex likely owned by task kworker/0:189:3725. task:kworker/0:189 state:R running task stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62ad4>] (__schedule) from [<81a63e90>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84f72400 r8:80200be4 r7:e04f1d5c r6:ffffffff r5:84f72400 r4:00000000 [<81a63e50>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04f1d28 to 0xe04f1d70) 1d20: 86efc000 dfe9d000 00000001 80239b98 7f1e5000 00000001 1d60: 80230ad4 80239bb0 800e0013 ffffffff r4:82ac11e4 r4:e04f1dc0 [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3e20>] (_vm_unmap_aliases) from [<804e7d68>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faa780 r4:00000000 [<804e7c00>] (vfree) from [<80547a08>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f72400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<805479d8>] (execmem_free) from [<803c6fdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee5000 [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6fcc>] (bpf_jit_free_exec) from [<803c73bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7354>] (bpf_jit_free) from [<803c844c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ea738c r4:84ea7000 [<803c8300>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ea738c r4:84fab500