Extracting prog: 6m53.255356351s Minimizing prog: 2h1m43.521434116s Simplifying prog options: 0s Extracting C: 9m5.28355382s Simplifying C: 58m23.709791255s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bind$packet-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bind$packet-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 5 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bind$packet-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bind$packet-bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bind$packet-bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bind$packet-bpf$PROG_LOAD detailed listing: executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h16m5.770177002s repro crashed as (corrupted=false): INFO: task kworker/1:2:697 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:697 tgid:697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e00e9d84 r8:00000002 r7:60000013 r6:e00e9d8c r5:83311800 r4:83311800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83311800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83311800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577c38c r4:8577c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577c38c r4:832d1480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83311800 r8:832d14ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832d1480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d1480 r8:8027ecf4 r7:df879e60 r6:83bc9300 r5:83311800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e9fb0 to 0xe00e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832d0e40 INFO: task kworker/1:2:697 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bb9f8000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:3:1785 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:1785 tgid:1785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:842abc00 r4:842abc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842abc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e38c r4:8577e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577e38c r4:8423b780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842abc00 r8:8423b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8423b780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b780 r8:8027ecf4 r7:df985e60 r6:83bd2180 r5:842abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8423f300 INFO: task kworker/1:3:1785 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bb9f8000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:3:2883 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:2883 tgid:2883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec58dd84 r8:00000002 r7:60000013 r6:ec58dd8c r5:83aa3c00 r4:83aa3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed60d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d92b8c r4:85d92800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d92b8c r4:84548180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3c00 r8:845481ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84548180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84548180 r8:8027ecf4 r7:df845e60 r6:84548200 r5:83aa3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84546840 INFO: task kworker/0:3:2883 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc1af000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:0:3095 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:84288c00 r4:84288c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84288c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509e38c r4:8509e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509e38c r4:8475df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:8475df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475df00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475df00 r8:8027ecf4 r7:eb101e60 r6:84398180 r5:84288c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84747700 INFO: task kworker/1:0:3095 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc1af000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:6:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:8323e000 r4:8323e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8323e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb0b8c r4:84398780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:843987ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398780 r8:8027ecf4 r7:df9a1e60 r6:84398800 r5:8323e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a280 INFO: task kworker/0:6:3120 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc76b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:7:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e1d84 r8:00000002 r7:60000013 r6:df9e1d8c r5:83240000 r4:83240000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83240000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb238c r4:84398880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:843988ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398880 r8:8027ecf4 r7:df9d5e60 r6:84398900 r5:83240000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a080 INFO: task kworker/0:7:3122 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc76b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:8:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:83b3d400 r4:83b3d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b3d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502aa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b3d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb138c r4:84bb1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb138c r4:84398980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b3d400 r8:843989ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398980 r8:8027ecf4 r7:df9e1e60 r6:84398a00 r5:83b3d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a5c0 INFO: task kworker/0:8:3123 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bcf73000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:9:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:842b8c00 r4:842b8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842b8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0731000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd1f8c r4:84bd1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd1f8c r4:84398a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842b8c00 r8:84398aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398a80 r8:8027ecf4 r7:df9e1e60 r6:8475da80 r5:842b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a5c0 INFO: task kworker/0:9:3125 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bcf73000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:10:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:842bd400 r4:842bd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842bd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850498c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df971000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cf8c r4:8511cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511cf8c r4:84398b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842bd400 r8:84398b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398b00 r8:8027ecf4 r7:dfa01e60 r6:8475d900 r5:842bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474aa00 INFO: task kworker/0:10:3129 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bd77b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:1:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:842bec00 r4:842bec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842bec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518f78c r4:8518f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518f78c r4:8475d880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842bec00 r8:8475d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475d880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475d880 r8:8027ecf4 r7:eb101e60 r6:8475db00 r5:842bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d0c0 INFO: task kworker/1:1:3130 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bd77b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:842be000 r4:842be000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842be000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ab00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842be000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd3f8c r4:84bd3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd3f8c r4:84398b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842be000 r8:84398bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398b80 r8:8027ecf4 r7:dfa01e60 r6:8475d980 r5:842be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ab40 INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bd77b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:842a8c00 r4:842a8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842a8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccb8c r4:851cc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ccb8c r4:84398c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a8c00 r8:84398c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398c00 r8:8027ecf4 r7:dfa25e60 r6:84398c80 r5:842a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ac80 INFO: task kworker/0:12:3134 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bdf87000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:83b56000 r4:83b56000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b56000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b56000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cdb8c r4:851cd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851cdb8c r4:84398d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b56000 r8:84398d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398d00 r8:8027ecf4 r7:dfa31e60 r6:84398d80 r5:83b56000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ac80 INFO: task kworker/0:13:3135 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: beb92000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:8428a400 r4:8428a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8428a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529b78c r4:8529b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529b78c r4:8475d400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428a400 r8:8475d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475d400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475d400 r8:8027ecf4 r7:eb101e60 r6:84398e00 r5:8428a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d300 INFO: task kworker/1:4:3137 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bf24c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:83aa8c00 r4:83aa8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ffb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85112b8c r4:85112800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85112b8c r4:84398e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8c00 r8:84398eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398e80 r8:8027ecf4 r7:dfa39e60 r6:84398f00 r5:83aa8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d140 INFO: task kworker/0:14:3140 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bf24c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83aac800 r4:83aac800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aac800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aac800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8498ff8c r4:8498fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8498ff8c r4:84398f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aac800 r8:84398fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398f80 r8:8027ecf4 r7:dfa41e60 r6:84398580 r5:83aac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d1c0 INFO: task kworker/0:15:3142 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bfaa3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3143 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:838b0000 r4:838b0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85355f8c r4:85355c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85355f8c r4:84398300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b0000 r8:8439832c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398300 r8:8027ecf4 r7:dfa59e60 r6:84541d80 r5:838b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d340 INFO: task kworker/0:16:3143 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bfaa3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83a9c800 r4:83a9c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a9c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535638c r4:85356000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8535638c r4:83bd2380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9c800 r8:83bd23ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83bd2380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bd2380 r8:8027ecf4 r7:dfa0de60 r6:8475d780 r5:83a9c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d700 INFO: task kworker/0:17:3146 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bfc40000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa85d84 r8:00000002 r7:60000013 r6:dfa85d8c r5:84080000 r4:84080000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84080000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548df00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84080000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541eb8c r4:8541e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541eb8c r4:8475d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84080000 r8:8475d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475d700 r8:8027ecf4 r7:eb101e60 r6:8475d580 r5:84080000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d700 INFO: task kworker/1:5:3148 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bff97000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83b3b000 r4:83b3b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b3b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440b8c r4:85440800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85440b8c r4:843a2000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b3b000 r8:843a202c r7:82804d40 r6:dddced40 r5:dddced60 r4:843a2000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843a2000 r8:8027ecf4 r7:dfa65e60 r6:8475da00 r5:83b3b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d780 INFO: task kworker/0:18:3150 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0382000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3151 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:838a3c00 r4:838a3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499038c r4:84990000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499038c r4:8410cd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a3c00 r8:8410cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8410cd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8410cd00 r8:8027ecf4 r7:dfa91e60 r6:8475d800 r5:838a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d780 INFO: task kworker/0:19:3151 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c05ef000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3154 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:8407d400 r4:8407d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8407d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb103000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545738c r4:85457000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545738c r4:8410cc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407d400 r8:8410ccac r7:82804d40 r6:dddced40 r5:dddced60 r4:8410cc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8410cc80 r8:8027ecf4 r7:dfa91e60 r6:8475df80 r5:8407d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476db80 INFO: task kworker/0:20:3154 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c05ef000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:8407a400 r4:8407a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8407a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fef8c r4:855fec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fef8c r4:8475dd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407a400 r8:8475ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475dd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475dd80 r8:8027ecf4 r7:eb101e60 r6:8475dc80 r5:8407a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473da00 INFO: task kworker/1:6:3156 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0912000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3158 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac1d84 r8:00000002 r7:60000013 r6:dfac1d8c r5:84079800 r4:84079800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84079800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847976c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84079800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457f8c r4:85457c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85457f8c r4:83358080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84079800 r8:833580ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83358080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358080 r8:8027ecf4 r7:dfa79e60 r6:8475dd00 r5:84079800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476db80 INFO: task kworker/0:21:3158 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0b8c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3160 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:8407bc00 r4:8407bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85693640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8407bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562d38c r4:8562d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562d38c r4:83358000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407bc00 r8:8335802c r7:82804d40 r6:dddced40 r5:dddced60 r4:83358000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358000 r8:8027ecf4 r7:dfac1e60 r6:84398600 r5:8407bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476ddc0 INFO: task kworker/0:22:3160 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0f53000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfab1d84 r8:00000002 r7:60000013 r6:dfab1d8c r5:84078c00 r4:84078c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84078c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85693bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84078c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562db8c r4:8562d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562db8c r4:838d3100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84078c00 r8:838d312c r7:82804d40 r6:dddced40 r5:dddced60 r4:838d3100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838d3100 r8:8027ecf4 r7:dfacde60 r6:84548c00 r5:84078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b100 INFO: task kworker/0:23:3163 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c115a000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:8407c800 r4:8407c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8407c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb475000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577cb8c r4:8577c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577cb8c r4:830b8680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407c800 r8:830b86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830b8680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027ecf4 r7:eb101e60 r6:830b8480 r5:8407c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473df00 INFO: task kworker/1:7:3164 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c148e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83ab0000 r4:83ab0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562eb8c r4:8562e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562eb8c r4:830cd100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab0000 r8:830cd12c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ecf4 r7:dfab1e60 r6:830b8580 r5:83ab0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b200 INFO: task kworker/0:24:3166 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c175f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83ab4800 r4:83ab4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a43c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb645000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562f38c r4:8562f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562f38c r4:830cd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab4800 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ecf4 r7:dfaf1e60 r6:830b8400 r5:83ab4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b100 INFO: task kworker/0:25:3168 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c18aa000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83ab6000 r4:83ab6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578738c r4:85787000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578738c r4:830cd280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab6000 r8:830cd2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027ecf4 r7:dfafde60 r6:832a1e80 r5:83ab6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b400 INFO: task kworker/0:26:3170 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c1b6d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83ab6c00 r4:83ab6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e0340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499238c r4:84992000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499238c r4:830cd080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab6c00 r8:830cd0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ecf4 r7:dfb0de60 r6:832a1200 r5:83ab6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b6c0 INFO: task kworker/0:27:3171 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c1e04000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb2dd84 r8:00000002 r7:60000013 r6:dfb2dd8c r5:83ab3c00 r4:83ab3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e0840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84992b8c r4:84992800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84992b8c r4:83c20000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab3c00 r8:83c2002c r7:82804d40 r6:dddced40 r5:dddced60 r4:83c20000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c20000 r8:8027ecf4 r7:dfb0de60 r6:832a1e00 r5:83ab3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b680 INFO: task kworker/0:28:3174 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c20dc000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb49d84 r8:00000002 r7:60000013 r6:dfb49d8c r5:83312400 r4:83312400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83312400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83312400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85863b8c r4:85863800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85863b8c r4:84735000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83312400 r8:8473502c r7:82804d40 r6:dddced40 r5:dddced60 r4:84735000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84735000 r8:8027ecf4 r7:dfb31e60 r6:83df9e80 r5:83312400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ba80 INFO: task kworker/0:30:3177 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c24e9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83315400 r4:83315400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83315400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83315400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577cf8c r4:8577cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577cf8c r4:84828000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83315400 r8:8482802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828000 r8:8027ecf4 r7:eb101e60 r6:84828100 r5:83315400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4900 INFO: task kworker/1:8:3182 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c24e9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:833a8000 r4:833a8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577d78c r4:8577d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577d78c r4:84828180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a8000 r8:848281ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828180 r8:8027ecf4 r7:eb101e60 r6:84828200 r5:833a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4900 INFO: task kworker/1:9:3185 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2687000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:83aa2400 r4:83aa2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577df8c r4:8577dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577df8c r4:84828280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa2400 r8:848282ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828280 r8:8027ecf4 r7:eb101e60 r6:84828300 r5:83aa2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4c80 INFO: task kworker/1:10:3186 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2954000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:83aa6000 r4:83aa6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa6000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577eb8c r4:8577e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577eb8c r4:84828380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:848283ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828380 r8:8027ecf4 r7:eb101e60 r6:84828400 r5:83aa6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4fc0 INFO: task kworker/1:11:3189 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2bc9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:83aa0c00 r4:83aa0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e78c r4:8577e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577e78c r4:84828480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa0c00 r8:848284ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828480 r8:8027ecf4 r7:dfb7de60 r6:84828500 r5:83aa0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4fc0 INFO: task kworker/1:12:3190 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2e91000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83316000 r4:83316000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83316000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83316000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577f38c r4:8577f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577f38c r4:84828580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83316000 r8:848285ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828580 r8:8027ecf4 r7:dfb7de60 r6:84828600 r5:83316000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829080 INFO: task kworker/1:13:3193 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3276000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:849c0000 r4:849c0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577ef8c r4:8577ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577ef8c r4:84828680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0000 r8:848286ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828680 r8:8027ecf4 r7:dfb4de60 r6:84828700 r5:849c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829280 INFO: task kworker/1:14:3195 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3276000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:849c0c00 r4:849c0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577f78c r4:8577f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577f78c r4:84828780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:848287ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828780 r8:8027ecf4 r7:dfb4de60 r6:84828800 r5:849c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829280 INFO: task kworker/1:15:3196 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3276000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:849c2400 r4:849c2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577ff8c r4:8577fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577ff8c r4:84828880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c2400 r8:848288ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828880 r8:8027ecf4 r7:dfba5e60 r6:84828900 r5:849c2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829440 INFO: task kworker/1:16:3199 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3834000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:849c3000 r4:849c3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577fb8c r4:8577f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577fb8c r4:84828980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3000 r8:848289ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828980 r8:8027ecf4 r7:dfad9e60 r6:84828a00 r5:849c3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829840 INFO: task kworker/1:17:3201 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3834000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:849c3c00 r4:849c3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb67000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578038c r4:85780000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578038c r4:84828a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3c00 r8:84828aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828a80 r8:8027ecf4 r7:dfad9e60 r6:84828b00 r5:849c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829840 INFO: task kworker/1:18:3202 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3d17000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:849c1800 r4:849c1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb81000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578078c r4:85780400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578078c r4:84828b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:84828bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828b80 r8:8027ecf4 r7:dfbc9e60 r6:84828c00 r5:849c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829cc0 INFO: task kworker/1:19:3206 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c4315000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:832f0000 r4:832f0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85780f8c r4:85780c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85780f8c r4:84828c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0000 r8:84828cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828c80 r8:8027ecf4 r7:dfb9de60 r6:84735180 r5:832f0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829900 INFO: task kworker/1:20:3207 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:838b5400 r4:838b5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:838b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85780b8c r4:85780800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85780b8c r4:84828d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:84828d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828d00 r8:8027ecf4 r7:dfbe9e60 r6:84735200 r5:838b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820080 INFO: task kworker/1:21:3209 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:8324a400 r4:8324a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8324a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85781b8c r4:85781800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85781b8c r4:84828d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:84828dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828d80 r8:8027ecf4 r7:dfbe9e60 r6:84735280 r5:8324a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820140 INFO: task kworker/1:22:3211 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:849c5400 r4:849c5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578138c r4:85781000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578138c r4:84828e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:84828e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828e00 r8:8027ecf4 r7:dfc0de60 r6:84828e80 r5:849c5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820140 INFO: task kworker/1:23:3212 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:849c6000 r4:849c6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec66b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578178c r4:85781400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578178c r4:84828f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6000 r8:84828f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828f00 r8:8027ecf4 r7:dfc0de60 r6:84828f80 r5:849c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:849c6c00 r4:849c6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782b8c r4:85782800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85782b8c r4:84764000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6c00 r8:8476402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764000 r8:8027ecf4 r7:dfc0de60 r6:84764080 r5:849c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820540 INFO: task kworker/1:25:3218 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:849c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec6b3000 r10:61c88647 r9:849c4800 r8:8476412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:27:3222 blocked for more than 451 seconds. r5:83310c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e480 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782f8c r4:85782c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85782f8c r4:84764200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83310c00 r8:8476422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764200 r8:8027ecf4 r7:dfc1de60 r6:84764280 r5:83310c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820880 INFO: task kworker/1:27:3222 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c58fb000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:849c8000 r5:849c8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e600 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848209c0 INFO: task kworker/1:28:3223 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c5e18000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3225 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:849c9800 r4:849c9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ea00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e076f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578438c r4:85784000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578438c r4:84764400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c9800 r8:8476442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764400 r8:8027ecf4 r7:dfc41e60 r6:84764480 r5:849c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820a80 INFO: task kworker/1:29:3225 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c5e18000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Exception stack(0xe044dfb0 to 0xe044dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:849cb000 r5:849cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec811000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578378c r4:85783400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578378c r4:84764500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cb000 r8:8476452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764500 r8:8027ecf4 r7:dfc55e60 r6:84764580 r5:849cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820e80 INFO: task kworker/1:30:3227 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c5e18000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3228 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:849c8c00 r4:849c8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783b8c r4:85783800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85783b8c r4:84764680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c8c00 r8:847646ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764680 r8:8027ecf4 r7:dfc55e60 r6:84764700 r5:849c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820a40 INFO: task kworker/1:31:3228 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6472000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3230 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:849ca400 r4:849ca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfded000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783f8c r4:85783c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85783f8c r4:84764780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:847647ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764780 r8:8027ecf4 r7:dfc55e60 r6:84764800 r5:849ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f040 INFO: task kworker/1:32:3230 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6472000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3233 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:849cc800 r4:849cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ec00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85784b8c r4:85784800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85784b8c r4:84764880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cc800 r8:847648ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764880 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f200 INFO: task kworker/1:33:3233 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6472000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3236 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfca5d84 r8:00000002 r7:60000113 r6:dfca5d8c r5:84089800 r4:84089800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84089800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84089800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578478c r4:85784400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578478c r4:84764980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84089800 r8:847649ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764980 r8:8027ecf4 r7:dfc35e60 r6:84735300 r5:84089800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f3c0 INFO: task kworker/1:34:3236 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6970000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3237 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:84088000 r4:84088000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84088000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84088000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb235000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85784f8c r4:85784c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85784f8c r4:84764a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84088000 r8:84764a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764a00 r8:8027ecf4 r7:dfc35e60 r6:84735380 r5:84088000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:8408ec00 r5:8408ec00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8578538c r4:84764a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8408ec00 r8:84764aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764a80 r8:8027ecf4 r7:dfcb1e60 r6:84735400 r5:8408ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f740 INFO: task kworker/1:36:3238 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6c45000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:8408bc00 r4:8408bc00 r5:8408bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b5c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8439f880 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8324bc00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ef40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578578c r4:85785400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578578c r4:84764b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324bc00 r8:84764bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764b80 r8:8027ecf4 r7:dfcc1e60 r6:84735500 r5:8324bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f880 INFO: task kworker/1:38:3241 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c71a9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 task:kworker/1:39 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84878c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84764c00 r8:8027ecf4 r7:dfcc1e60 r6:84735580 r5:84878c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f9c0 INFO: task kworker/1:39:3246 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c77b9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:40 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:849ce000 r4:849ce000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ce000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520efc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb757000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85785f8c r4:85785c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85785f8c r4:84764c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ce000 r8:84764cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764c80 r8:8027ecf4 r7:df9dde60 r6:84764d00 r5:849ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r4:849cd400 r5:849cd400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba09000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578678c r4:85786400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578678c r4:84764d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cd400 r8:84764dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764d80 r8:8027ecf4 r7:df9dde60 r6:84764e00 r5:849cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439fc40 INFO: task kworker/1:41:3249 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c7f78000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9c9d84 r8:00000002 r7:60000013 r6:df9c9d8c r5:849cbc00 r4:849cbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebba5000 r10:61c88647 r9:849cbc00 r8:84764eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:849cec00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84764f80 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3256 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:838b0c00 r4:838b0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6780 r9:83018205 r8:838b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:838b0c00 r8:847860ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83aa4800 r4:83aa4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578938c r4:85789000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578938c r4:84786180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa4800 r8:847861ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786180 r8:8027ecf4 r7:dfa21e60 r6:84786200 r5:83aa4800 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:849d0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8578838c r4:85788000 r10:61c88647 r9:849d0000 r8:847862ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:849d0c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788b8c r4:85788800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85788b8c r4:84786380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0c00 r8:847863ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786380 r8:8027ecf4 r7:dfa55e60 r6:84786400 r5:849d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84787180 INFO: task kworker/1:47:3262 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c9384000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:48:3263 blocked for more than 452 seconds. r4:849d1800 r5:849d1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:48:3263 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c98ce000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:dfa81d84 r8:00000002 r7:60000013 r6:dfa81d8c r5:849d2400 r5:849d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e66c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec719000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578978c r4:85789400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578978c r4:84786580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d2400 r8:847865ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786580 r8:8027ecf4 r7:dfa55e60 r6:84786600 r5:849d2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84787680 INFO: task kworker/1:49:3266 is blocked on a mutex likely owned by task kworker/1:209:3661. dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:51:3269 blocked for more than 452 seconds. r5:849d3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c98ce000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3566 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84b64800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68c40 r7:dddced40 r6:83018000 r5:8498d78c r4:84808100 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3597 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3597 tgid:3597 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:8491a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb038c r4:84bb0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb038c r4:84808a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491a400 r8:84808a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84808a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84808a00 r8:8027ecf4 r7:e0081e60 r6:84808a80 r5:8491a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b1fb0 to 0xe00b1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847a6d80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3660 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0451d84 r8:00000002 r7:60000013 r6:e0451d8c r5:84b73c00 r4:84b73c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b73c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0451e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Not tainted 6.15.0-syzkaller #0 r5:84b76000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847894c0 INFO: task kworker/1:210:3664 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ca0e0000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3667 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r5:84b76c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: ca56b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 r4:e044ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3668 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3668 tgid:3668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e045dd84 r8:00000002 r7:60000113 r6:e045dd8c r5:84b75400 r4:84b75400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b75400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e045de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e004f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b75400 r8:850210ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:84b70000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84be578c r4:84be5400 r4:85021180 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789700 INFO: task kworker/1:213:3669 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cac1a000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:3672 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:84b7ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789d00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 r4:84b80000 r5:84b80000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be538c r4:84be5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be538c r4:85021380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b80000 r8:850213ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021380 r8:8027ecf4 r7:e0465e60 r6:85021400 r5:84b80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0479fb0 to 0xe0479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789d80 INFO: task kworker/1:215:3674 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cafef000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:84b80c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:3678 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3678 tgid:3678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e046dd84 r8:00000002 r7:60000113 r6:e046dd8c r5:84b82400 r4:84b82400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b82400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b82400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be5f8c r4:84be5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be5f8c r4:85021580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b82400 r8:850215ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021580 r8:8027ecf4 r7:e0485e60 r6:85021600 r5:84b82400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe046dfb0 to 0xe046dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502c280 INFO: task kworker/1:217:3678 is blocked on a mutex likely owned by task kworker/1:209:3661. Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 INFO: task kworker/1:218:3680 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:3680 tgid:3680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:848ebc00 r4:848ebc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ebc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ccc0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85021680 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b83000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84be638c r4:85021700 r4:85021700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021700 r8:8027ecf4 r7:e04ade60 r6:85021780 r5:84b83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a1fb0 to 0xe04a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502c380 INFO: task kworker/1:219:3681 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cbd11000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:3684 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04d1d84 r8:00000002 r7:60000113 r6:e04d1d8c r5:84b84800 r4:84b84800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b84800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:84bb078c r4:84bb0400 r10:00000000 r9:84b6a180 r8:8027ecf4 r7:e00b1e60 r6:85021800 r5:84b84800 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:3686 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:3686 tgid:3686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:84b81800 r4:84b81800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b81800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b81800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfaf8c r4:84bfac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bfaf8c r4:84b6a200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b81800 r8:84b6a22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a200 r8:8027ecf4 r7:e04d1e60 r6:85021880 r5:84b81800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84b68d00 INFO: task kworker/0:68:3686 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cbe12000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:3687 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04ddd84 r8:00000002 r7:60000113 r6:e04ddd8c r5:84b83c00 r4:84b83c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b83c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850366c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0f8c r4:84b <> 0000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84870000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e9b8c r4:855e9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855e9b8c r4:8569e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870000 r8:8569e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e200 r8:8027ecf4 r7:ec859e60 r6:85691300 r5:84870000 Exception stack(0xec861fb0 to 0xec861ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495ab8c r4:8495a800 r4:847a6c80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:5913 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec865d84 r8:00000002 r7:60000013 r6:ec865d8c r5:84870c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f100 r7:dddced40 r6:83018000 r5:855e9f8c r4:8569e280 Exception stack(0xec865fb0 to 0xec865ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 r4:84871800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:855ea78c r4:8569e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84871800 r8:8569e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e300 r8:8027ecf4 r7:ec865e60 r6:85691400 r5:84871800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569f200 INFO: task kworker/0:333:5915 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c287e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:5917 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:84872400 r4:84872400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84872400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebad7000 r10:61c88647 r9:84872400 r8:8569e3ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Not tainted 6.15.0-syzkaller #0 r4:84873000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:855eaf8c r4:855eac00 r10:00000000 r9:8569e400 r8:8027ecf4 r7:ec869e60 r6:85691500 r5:84873000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:336:5920 blocked for more than 475 seconds. r5:84873c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:5923 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:5923 tgid:5923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec879d84 r8:00000002 r7:60000013 r6:ec879d8c r5:84874800 r4:84874800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84874800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84874800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eb38c r4:855eb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855eb38c r4:8569e500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84874800 r8:8569e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e500 r8:8027ecf4 r7:ec871e60 r6:85691600 r5:84874800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569f740 INFO: task kworker/0:337:5923 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c3201000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:338:5925 blocked for more than 475 seconds. r10:829189c0 r9:ec87dd84 r8:00000002 r7:60000113 r6:ec87dd8c r5:84875400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569f840 INFO: task kworker/0:338:5925 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c3551000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:5927 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec881d84 r8:00000002 r7:60000013 r6:ec881d8c r5:84876000 r4:84876000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84876000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:340:5929 blocked for more than 475 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:5932 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:5932 tgid:5932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:85748c00 r4:85748c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85748c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569fec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85748c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c838c r4:855c8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c838c r4:8569e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748c00 r8:8569e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e700 r8:8027ecf4 r7:ec885e60 r6:85691800 r5:85748c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569fb80 INFO: task kworker/0:341:5932 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r10:829189c0 r9:ec895d84 r8:00000002 r7:60000113 r6:ec895d8c r5:8574b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c878c r4:855c8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c878c r4:8569e780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574b000 r8:8569e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e780 r8:8027ecf4 r7:ec889e60 r6:85691880 r5:8574b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec895fb0 to 0xec895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569fcc0 INFO: task kworker/0:342:5935 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c3d25000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:855c8b8c r4:855c8800 r4:8569e800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:5938 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec89dd84 r8:00000002 r7:60000013 r6:ec89dd8c r5:85748000 r4:85748000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85748000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec89de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85748000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c938c r4:855c9000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:345:5940 blocked for more than 476 seconds. r10:829189c0 r9:ec8a1d84 r8:00000002 r7:60000113 r6:ec8a1d8c r5:8574bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r9:83018005 r8:8574bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 r10:61c88647 r9:8574bc00 r8:8569e92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:5942 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:8574c800 r4:8574c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec813000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c978c r4:855c9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c978c r4:8569ea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574d400 r8:8569ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ea00 r8:8027ecf4 r7:ec8a5e60 r6:85691b00 r5:8574d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219380 INFO: task kworker/0:347:5944 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:5945 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:8574e000 r4:8574e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c9b8c r4:855c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c9b8c r4:8569ea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574e000 r8:8569eaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ea80 r8:8027ecf4 r7:ec8a5e60 r6:85691b80 r5:8574e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219040 INFO: task kworker/0:348:5945 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:5950 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:857f0000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:857f0000 r8:8569eb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:847a6c80 r4:00000001 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:5953 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8f5d84 r8:00000002 r7:60000013 r6:ec8f5d8c r5:857f2400 r4:857f2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ca78c r4:855ca400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ca78c r4:8569eb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f2400 r8:8569ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569eb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569eb80 r8:8027ecf4 r7:ec8a5e60 r6:85691c80 r5:857f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219780 INFO: task kworker/0:350:5953 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c508d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:351:5954 blocked for more than 476 seconds. r5:857f3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:855cab8c r4:855ca800 r4:8569ec00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:5956 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec911d84 r8:00000002 r7:60000013 r6:ec911d8c r5:857f1800 r4:857f1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cb38c r4:855cb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cb38c r4:8569ec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f1800 r8:8569ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ec80 r8:8027ecf4 r7:ec8f9e60 r6:85691d80 r5:857f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219a80 INFO: task kworker/0:352:5956 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:85740000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c5473000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:5960 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:85743c00 r4:85743c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85743c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85743c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec929000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbb8c r4:855cb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cbb8c r4:8569ee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85743c00 r8:8569ee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ee00 r8:8027ecf4 r7:ec911e60 r6:8569ee80 r5:85743c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec905fb0 to 0xec905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219c40 INFO: task kworker/0:354:5960 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:355:5961 blocked for more than 476 seconds. r5:84836000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c5aef000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:5964 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:5964 tgid:5964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:8567e000 r4:8567e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8567e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec935000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbf8c r4:855cbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cbf8c r4:85481000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567e000 r8:8548102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481000 r8:8027ecf4 r7:ec905e60 r6:85481080 r5:8567e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec92dfb0 to 0xec92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 task:kworker/0:357 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:ec94d000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec941000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575838c r4:85758000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575838c r4:85481200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a90c00 r8:8548122c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481200 r8:8027ecf4 r7:ec939e60 r6:85481280 r5:84a90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85470180 INFO: task kworker/0:358:5968 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c6541000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:5970 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:5970 tgid:5970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec951d84 r8:00000002 r7:60000013 r6:ec951d8c r5:84a91800 r4:84a91800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a91800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a91800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec971000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a91800 r8:8548132c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0451d20 to 0xe0451d68) r4:82ac11e4 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:5972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec95dd84 r8:00000002 r7:60000013 r6:ec95dd8c r5:84a92400 r4:84a92400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a92400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec959000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85758b8c r4:85758800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85758b8c r4:85481400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a92400 r8:8548142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481400 r8:8027ecf4 r7:ec951e60 r6:85481480 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c6bf6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec965000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85758f8c r4:85758c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85758f8c r4:85481500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a93c00 r8:8548152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481500 r8:8027ecf4 r7:ec951e60 r6:85481580 r5:84a93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854706c0 INFO: task kworker/0:361:5973 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c6f1f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:362:5976 blocked for more than 476 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c71da000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0451fb0 to 0xe0451ff8) Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85481700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481700 r8:8027ecf4 r7:ec969e60 r6:85481780 r5:84a95400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec97dfb0 to 0xec97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85470940 INFO: task kworker/0:363:5978 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:ec989d84 r8:00000002 r7:60000113 r6:ec989d8c r5:84a96000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ec985000 r4:85481800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ec99d000 r4:85481900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c7ac2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:5984 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:84a93000 r4:84a93000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a93000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219400 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:5986 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9add84 r8:00000002 r7:60000013 r6:ec9add8c r5:848b0000 r4:848b0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575a78c r4:8575a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575a78c r4:85481b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0000 r8:85481b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481b00 r8:8027ecf4 r7:ec9a1e60 r6:85481b80 r5:848b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219000 INFO: task kworker/0:367:5986 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c7ac2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e07ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575af8c r4:8575ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575af8c r4:85481c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0c00 r8:85481c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481c00 r8:8027ecf4 r7:ec9a1e60 r6:85481c80 r5:848b0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856a3380 INFO: task kworker/0:368:5988 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c8468000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:5991 tgid:5991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec849d84 r8:00000002 r7:60000113 r6:ec849d8c r5:848b1800 r4:848b1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854672c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8575b38c r4:8575b000 r10:00000000 r9:85481d00 r8:8027ecf4 r7:ec82de60 r6:85481d80 r5:848b1800 r4:85467200 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85481e00 r8:8027ecf4 r7:ec849e60 r6:85481e80 r5:848b2400 r4:85467140 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r5:848b3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f101000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575bb8c r4:8575b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575bb8c r4:85481f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b3000 r8:85481f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481f00 r8:8027ecf4 r7:ec9b1e60 r6:85481f80 r5:848b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467340 INFO: task kworker/0:371:5995 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c8a65000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467940 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467480 INFO: task kworker/0:372:5996 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c8a65000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:373:5998 blocked for more than 476 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8575bf8c r4:8575bc00 r4:852ea100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c8ea3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:6001 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9c1d84 r8:00000002 r7:60000013 r6:ec9c1d8c r5:848b5400 r4:848b5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f107000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576078c r4:85760400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576078c r4:852ea200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:852ea22c r7:82804d40 r6:dddced40 r5:dddced60 r4:852ea200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ea200 r8:8027ecf4 r7:ec9b9e60 r6:852ea280 r5:848b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c1fb0 to 0xec9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854677c0 INFO: task kworker/0:374:6001 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c9402000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:6002 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:6002 tgid:6002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:848b6000 r4:848b6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f109000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85760b8c r4:85760800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85760b8c r4:852ea300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6000 r8:852ea32c r7:82804d40 r6:dddced40 r5:dddced60 r4:852ea300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ea300 r8:8027ecf4 r7:ec9c1e60 r6:852ea380 r5:848b6000 Exception stack(0xec9c9fb0 to 0xec9c9ff8) r4:85467900 Workqueue: events bpf_prog_free_deferred 1d20: c9402000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:6004 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:849f0000 r4:849f0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f10b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85760f8c r4:85760c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85760f8c r4:852ea400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:852ea400 r8:8027ecf4 r7:ec9c9e60 r6:852ea480 r5:849f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:6006 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9d1d84 r8:00000002 r7:60000113 r6:ec9d1d8c r5:849f1800 r4:849f1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f10d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576138c r4:85761000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576138c r4:852ea500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f1800 r8:852ea52c r7:82804d40 r6:dddced40 r5:dddced60 r4:852ea500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ea500 r8:8027ecf4 r7:ec9cde60 r6:852ea580 r5:849f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467d40 INFO: task kworker/0:377:6006 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c9dc9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 r5:849f0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85761b8c r4:852ea700 r10:00000000 r9:852ea700 r8:8027ecf4 r7:ec9d5e60 r6:852ea780 r5:849f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d9fb0 to 0xec9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cb100 INFO: task kworker/0:379:6009 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ca07f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:6012 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849f3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856cb100 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ca303000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:856cb4c0 Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:6016 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9e5d84 r8:00000002 r7:60000013 r6:ec9e5d8c r5:849f5400 r4:849f5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cbec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec717000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576338c r4:85763000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576338c r4:852eaa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f5400 r8:852eaa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852eaa00 Exception stack(0xec9e5fb0 to 0xec9e5ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cba40 r7:dddced40 r6:83018000 r5:8576278c r4:852eab00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:856cb8c0 INFO: task kworker/0:383:6018 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ca745000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r9:83018005 r8:849f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f119000 r10:61c88647 r9:849f6c00 r8:852eac2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cbd40 r7:dddced40 r6:83018000 r5:85762f8c r4:852ead00 r4:852ead00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ead00 r8:8027ecf4 r7:ec9e5e60 r6:852ead80 r5:849f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cbc80 INFO: task kworker/0:385:6021 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: caeb9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:6024 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9f1d84 r8:00000002 r7:60000113 r6:ec9f1d8c r5:848b6c00 r4:848b6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec74b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576378c r4:85763400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576378c r4:852eae00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6c00 r8:852eae2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852eae00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eae00 r8:8027ecf4 r7:ec9e5e60 r6:852eae80 r5:848b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cbcc0 INFO: task kworker/0:386:6024 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:857d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f121000 r4:852eaf00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9fdd84 r8:00000002 r7:60000113 r6:ec9fdd8c r5:857d0c00 r4:857d0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763f8c r4:85763c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85763f8c r4:856be000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d0c00 r8:856be02c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be000 r8:8027ecf4 r7:ec9f9e60 r6:856be080 r5:857d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467e00 INFO: task kworker/0:388:6028 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 Exception stack(0xe0451fb0 to 0xe0451ff8) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:00000000 r9:856be100 r8:8027ecf4 r7:ec9fde60 r6:856be180 r5:857d1800 Exception stack(0xe0451d20 to 0xe0451d68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:857d2400 r4:857d2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r7:dddced40 r6:83018000 r5:8576c78c r4:856be200 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cbbc9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:857d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f129000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576cb8c r4:8576c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856be300 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:6036 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:857d3c00 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeca19fb0 to 0xeca19ff8) [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 Exception stack(0xe0451fb0 to 0xe0451ff8) task:kworker/0:393 state:D stack:0 pid:6038 tgid:6038 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeca25fb0 to 0xeca25ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:6040 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:6040 tgid:6040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca49d84 r8:00000002 r7:60000113 r6:eca49d8c r5:857f3c00 r4:857f3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576d38c r4:8576d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576d38c r4:856be600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3c00 r8:856be62c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be600 r8:8027ecf4 r7:eca25e60 r6:85691e00 r5:857f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bb740 INFO: task kworker/0:394:6040 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cc4db000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:6042 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:6042 tgid:6042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca4dd84 r8:00000002 r7:60000113 r6:eca4dd8c r5:857f6000 r4:857f6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bba40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca39000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576d78c r4:8576d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576d78c r4:856be680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6000 r8:856be6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be680 r8:8027ecf4 r7:eca25e60 r6:85691e80 r5:857f6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca4dfb0 to 0xeca4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bb840 INFO: task kworker/0:395:6042 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cca60000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:6044 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:6044 tgid:6044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca59d84 r8:00000002 r7:60000113 r6:eca59d8c r5:857f6c00 r4:857f6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbcc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576e78c r4:8576e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576e78c r4:856be700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6c00 r8:856be72c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be700 r8:8027ecf4 r7:eca25e60 r6:85691f00 r5:857f6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bba80 INFO: task kworker/0:396:6044 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cca60000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:6045 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:6045 tgid:6045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca5dd84 r8:00000002 r7:60000013 r6:eca5dd8c r5:857f0c00 r4:857f0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f133000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576df8c r4:8576dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576df8c r4:856be780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0c00 r8:856be7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be780 r8:8027ecf4 r7:eca59e60 r6:85691f80 r5:857f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca5dfb0 to 0xeca5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bb940 INFO: task kworker/0:397:6045 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ccce3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:6048 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca31d84 r8:00000002 r7:60000113 r6:eca31d8c r5:857f5400 r4:857f5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f137000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576e38c r4:8576e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576e38c r4:856be800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f5400 r8:856be82c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be800 r8:8027ecf4 r7:eca59e60 r6:85493000 r5:857f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca31fb0 to 0xeca31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bbe00 INFO: task kworker/0:398:6048 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ccce3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:6052 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca91d84 r8:00000002 r7:60000013 r6:eca91d8c r5:8574ec00 r4:8574ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576eb8c r4:8576e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576eb8c r4:856be880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574ec00 r8:856be8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be880 r8:8027ecf4 r7:eca59e60 r6:85493080 r5:8574ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca91fb0 to 0xeca91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498080 INFO: task kworker/0:399:6052 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd13b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:6053 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:6053 tgid:6053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca9dd84 r8:00000002 r7:60000013 r6:eca9dd8c r5:857f4800 r4:857f4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854987c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576fb8c r4:8576f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576fb8c r4:856be900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f4800 r8:856be92c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be900 r8:8027ecf4 r7:eca91e60 r6:85493100 r5:857f4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca9dfb0 to 0xeca9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498240 INFO: task kworker/0:400:6053 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd13b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:6054 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:6054 tgid:6054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca3dd84 r8:00000002 r7:60000113 r6:eca3dd8c r5:857d6000 r4:857d6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576ef8c r4:8576ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576ef8c r4:856be980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6000 r8:856be9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be980 r8:8027ecf4 r7:eca9de60 r6:856bea00 r5:857d6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca3dfb0 to 0xeca3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498240 INFO: task kworker/0:401:6054 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd6fe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:6057 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca8dd84 r8:00000002 r7:60000013 r6:eca8dd8c r5:857d6c00 r4:857d6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854984c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576f38c r4:8576f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576f38c r4:856bea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6c00 r8:856beaac r7:82804d40 r6:dddced40 r5:dddced60 r4:856bea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bea80 r8:8027ecf4 r7:eca9de60 r6:856beb00 r5:857d6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498500 INFO: task kworker/0:402:6057 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd6fe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:6058 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:6058 tgid:6058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecaadd84 r8:00000002 r7:60000013 r6:ecaadd8c r5:857d5400 r4:857d5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:857d5400 r8:856bebac r7:82804d40 r6:dddced40 r5:dddced60 r4:856beb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856beb80 r8:8027ecf4 r7:eca9de60 r6:856bec00 r5:857d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaadfb0 to 0xecaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498500 INFO: task kworker/0:403:6058 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cdd0b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee619000 1fa0: 00000000 00000000 00000000 00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r7:dddced40 r6:83018000 r5:8577438c r4:856bec80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab9fb0 to 0xecab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498640 INFO: task kworker/0:404:6061 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r5:844b8c00 r4:829189bc [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854988c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f145000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856bed80 r8:8027ecf4 r7:ecab9e60 r6:856bee00 r5:844b8c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:406 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:844b9800 r8:856beeac r7:82804d40 r6:dddced40 r5:dddced60 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) Exception stack(0xe0451fb0 to 0xe0451ff8) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad1e08 r5:00001000 r4:eaedb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85774b8c r4:85774800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85774b8c r4:856bef80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ba400 r8:856befac r7:82804d40 r6:dddced40 r5:dddced60 r4:856bef80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bef80 r8:8027ecf4 r7:ec9f5e60 r6:855ee000 r5:844ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498ac0 INFO: task kworker/0:407:6067 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ce8da000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:6069 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec7e1d84 r8:00000002 r7:60000113 r6:ec7e1d8c r5:844bb000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xec7e1fb0 to 0xec7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498b40 INFO: task kworker/0:408:6069 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ceecd000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:409:6070 blocked for more than 477 seconds. r4:844bbc00 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577538c r4:85775000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577538c r4:855ee180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bbc00 r8:855ee1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee180 r8:8027ecf4 r7:ec7e1e60 r6:855ee200 r5:844bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaddfb0 to 0xecaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498b40 INFO: task kworker/0:409:6070 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cf1b2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:6073 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:410 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577578c r4:85775400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577578c r4:855ee280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bc800 r8:855ee2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee280 r8:8027ecf4 r7:ecadde60 r6:855ee300 r5:844bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831000 INFO: task kworker/0:410:6073 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0451dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:411:6075 blocked for more than 477 seconds. r10:829189c0 r9:ec915d84 r8:00000002 r7:60000113 r6:ec915d8c r5:844bd400 r4:844bd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85775b8c r4:85775800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85775b8c r4:855ee380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bd400 r8:855ee3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee380 r8:8027ecf4 r7:ec8dde60 r6:855ee400 r5:844bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85831000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecae1d84 r8:00000002 r7:60000013 r6:ecae1d8c r5:844be000 r4:844be000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844be000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858314c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85775f8c r4:85775c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85775f8c r4:855ee480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844be000 r8:855ee4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee480 r8:8027ecf4 r7:ec915e60 r6:855ee500 r5:844be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831200 INFO: task kworker/0:412:6078 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cf9a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:6079 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:6079 tgid:6079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecaedd84 r8:00000002 r7:60000113 r6:ecaedd8c r5:857f9800 r4:857f9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c9000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8577638c r4:855ee580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f9800 r8:855ee5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee580 r8:8027ecf4 r7:ecae1e60 r6:85493180 r5:857f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaedfb0 to 0xecaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831340 INFO: task kworker/0:413:6079 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cf9a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:6081 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:6081 tgid:6081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecaf5d84 r8:00000002 r7:60000113 r6:ecaf5d8c r5:857f8c00 r4:857f8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577678c r4:85776400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577678c r4:855ee600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8c00 r8:855ee62c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee600 r8:8027ecf4 r7:ecaede60 r6:85493200 r5:857f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf5fb0 to 0xecaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ecaf9d84 r8:00000002 r7:60000013 r6:ecaf9d8c r5:857fa400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85777f8c r4:85777c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:847a6c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776b8c r4:85776800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85776b8c r4:855ee700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:855ee72c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee700 r8:8027ecf4 r7:ecaf9e60 r6:85493300 r5:857fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb01fb0 to 0xecb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831580 INFO: task kworker/0:416:6084 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d03eb000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ecb09d84 r8:00000002 r7:60000013 r6:ecb09d8c r5:857fb000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776f8c r4:85776c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85776f8c r4:855ee780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fb000 r8:855ee7ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:855ee780 r8:8027ecf4 r7:ecaf9e60 r6:85493380 r5:857fb000 Workqueue: events bpf_prog_free_deferred r4:e0451dc0 r5:00001000 r4:ee619000 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb11d84 r8:00000002 r7:60000113 r6:ecb11d8c r5:857f8000 r4:857f8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:8577738c r4:85777000 Exception stack(0xecb11fb0 to 0xecb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831800 INFO: task kworker/0:418:6088 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:6090 tgid:6090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:857fe000 r4:857fe000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fe000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebc63000 r10:00000000 r9:855ee880 r8:8027ecf4 r7:ecaf9e60 r6:85493480 r5:857fe000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:6092 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:6092 tgid:6092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:857fec00 r4:857fec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85777b8c r4:855ee900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:6095 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:6095 tgid:6095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb29d84 r8:00000002 r7:60000013 r6:ecb29d8c r5:857fc800 r4:857fc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584c0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:857fc800 r8:855ee9ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:422:6096 blocked for more than 477 seconds. r10:829189c0 r9:ecb2dd84 r8:00000002 r7:60000113 r6:ecb2dd8c r5:857fd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb2de08 r9:83018005 r8:857fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r10:61c88647 r9:857fd400 r8:855eea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb2dfb0 to 0xecb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831d40 INFO: task kworker/0:422:6096 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d173c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:6099 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:6099 tgid:6099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:8574a400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ec6d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585c78c r4:8585c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585c78c r4:855eea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574a400 r8:855eeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:855eea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eea80 r8:8027ecf4 r7:ecb29e60 r6:85493680 r5:8574a400 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb35d84 r8:00000002 r7:60000013 r6:ecb35d8c r5:85800000 r4:85800000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85800000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584c5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85800000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec815000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585d78c r4:8585d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585d78c r4:855eeb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85800000 r8:855eeb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eeb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eeb00 r8:8027ecf4 r7:ecb29e60 r6:85493700 r5:85800000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d173c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584c340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85800c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585cf8c r4:8585cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585cf8c r4:855eeb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85800c00 r8:855eebac r7:82804d40 r6:dddced40 r5:dddced60 r4:855eeb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eeb80 r8:8027ecf4 r7:ecb35e60 r6:85493780 r5:85800c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb39fb0 to 0xecb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c240 INFO: task kworker/0:425:6102 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d203e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85801800 r8:855eec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eec00 r8:8027ecf4 r7:ecb35e60 r6:85493800 r5:85801800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb3dfb0 to 0xecb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c380 INFO: task kworker/0:426:6105 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d203e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:6107 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85802400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855eec80 r8:8027ecf4 r7:ecb35e60 r6:85493880 r5:85802400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c280 INFO: task kworker/0:427:6107 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d2422000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r4:85804800 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8585df8c r4:8585dc00 r10:00000000 r9:855eed00 r8:8027ecf4 r7:ecb41e60 r6:85493900 r5:85804800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c580 INFO: task kworker/0:428:6110 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d2422000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:6111 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:6111 tgid:6111 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:ecb51d84 r8:00000002 r7:60000113 r6:ecb51d8c r5:85805400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:430:6114 blocked for more than 477 seconds. Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85803c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec923000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585f78c r4:8585f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585f78c r4:855eee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85803c00 r8:855eee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eee00 r8:8027ecf4 r7:ecb51e60 r6:85493a00 r5:85803c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb5dfb0 to 0xecb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c840 INFO: task kworker/0:430:6114 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d26cc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d2d04000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:6117 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb1dd84 r8:00000002 r7:60000113 r6:ecb1dd8c r5:857e0000 r4:857e0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584cc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585eb8c r4:8585e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585eb8c r4:855eef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0000 r8:855eef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eef00 r8:8027ecf4 r7:ecb5de60 r6:855eef80 r5:857e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c900 INFO: task kworker/0:432:6117 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 Exception stack(0xe0451d20 to 0xe0451d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:6119 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:6119 tgid:6119 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8585ef8c r4:8585ec00 r4:85856000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856000 r8:8027ecf4 r7:ecb5de60 r6:85856080 r5:857e1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584cb80 INFO: task kworker/0:433:6119 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d20: d32fc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:434 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6124 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb71d84 r8:00000002 r7:60000113 r6:ecb71d8c r5:857e3c00 r4:857e3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec931000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585fb8c r4:8585f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585fb8c r4:85856200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e3c00 r8:8585622c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856200 r8:8027ecf4 r7:ecb5de60 r6:85856280 r5:857e3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847a6c80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:436:6126 blocked for more than 477 seconds. r10:829189c0 r9:ecb75d84 r8:00000002 r7:60000013 r6:ecb75d8c r5:857e5400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d4198000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:6128 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb79d84 r8:00000002 r7:60000113 r6:ecb79d8c r5:857e6000 r4:857e6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r4:00000000 r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:438:6129 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r5:857e6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec953000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586038c r4:85860000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586038c r4:85856500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e6c00 r8:8585652c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856500 r8:8027ecf4 r7:ecb79e60 r6:85856580 r5:857e6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855480 INFO: task kworker/0:438:6129 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d4dd2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:439:6133 blocked for more than 477 seconds. r5:857e2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855bc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:6134 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8e5d84 r8:00000002 r7:60000113 r6:ec8e5d8c r5:857e4800 r4:857e4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85860b8c r4:85860800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85860b8c r4:85856700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e4800 r8:8585672c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856700 r8:8027ecf4 r7:ecb6de60 r6:85856780 r5:857e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855680 INFO: task kworker/0:440:6134 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d52da000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:6135 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:6135 tgid:6135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:857e0c00 r4:857e0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586138c r4:85861000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586138c r4:85856800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0c00 r8:8585682c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856800 r8:8027ecf4 r7:ecb6de60 r6:85856880 r5:857e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855680 INFO: task kworker/0:441:6135 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d55a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:6138 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:6138 tgid:6138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb81d84 r8:00000002 r7:60000113 r6:ecb81d8c r5:844bec00 r4:844bec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586178c r4:85861400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586178c r4:85856900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bec00 r8:8585692c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856900 r8:8027ecf4 r7:ecb85e60 r6:85856980 r5:844bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855b80 INFO: task kworker/0:442:6138 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d55e8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:6140 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:6140 tgid:6140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb8dd84 r8:00000002 r7:60000013 r6:ecb8dd8c r5:84860000 r4:84860000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84860000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85861b8c r4:85861800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85861b8c r4:85856a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860000 r8:85856a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856a00 r8:8027ecf4 r7:ecb81e60 r6:85856a80 r5:84860000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855cc0 INFO: task kworker/0:443:6140 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d57bc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb91d84 r8:00000002 r7:60000113 r6:ecb91d8c r5:84860c00 r4:84860c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84860c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586278c r4:85862400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586278c r4:85856b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:85856b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856b00 r8:8027ecf4 r7:ecb8de60 r6:85856b80 r5:84860c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0000 INFO: task kworker/0:444:6142 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80070013 ffffffff r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:6145 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:6145 tgid:6145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb9dd84 r8:00000002 r7:60000113 r6:ecb9dd8c r5:84861800 r4:84861800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84861800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84861800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85861f8c r4:85861c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85861f8c r4:85856c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84861800 r8:85856c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856c00 r8:8027ecf4 r7:ecb91e60 r6:85856c80 r5:84861800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0240 INFO: task kworker/0:445:6145 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d5ea5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:6146 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:6146 tgid:6146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:84862400 r4:84862400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84862400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586238c r4:85862000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586238c r4:85856d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84862400 r8:85856d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856d00 r8:8027ecf4 r7:ecb91e60 r6:85856d80 r5:84862400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0240 INFO: task kworker/0:446:6146 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d60dd000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:447:6149 blocked for more than 478 seconds. r4:84863000 r5:84863000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84863000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85862b8c r4:85862800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85862b8c r4:85856e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863000 r8:85856e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856e00 r8:8027ecf4 r7:ecb91e60 r6:85856e80 r5:84863000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba9fb0 to 0xecba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0380 INFO: task kworker/0:447:6149 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:448:6150 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbd1d84 r8:00000002 r7:60000113 r6:ecbd1d8c r5:85809800 r4:85809800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85809800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85809800 r7:00000000 r6:83018000 r5:00001000 r4:7f0fb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85862f8c r4:85862c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85862f8c r4:85856f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85809800 r8:85856f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856f00 r8:8027ecf4 r7:ecba9e60 r6:85493b00 r5:85809800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: d60dd000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:6152 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:6152 tgid:6152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbe9d84 r8:00000002 r7:60000013 r6:ecbe9d8c r5:8580bc00 r4:8580bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d33c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84992f8c r4:85856f80 r4:85856f80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:858a0680 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d6953000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:450:6153 blocked for more than 478 seconds. r10:829189c0 r9:ecbedd84 r8:00000002 r7:60000013 r6:ecbedd8c r5:8580a400 r5:8580a400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:6155 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:8580b000 r4:8580b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583d2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580b000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca43000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586378c r4:85863400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586378c r4:858a8080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580b000 r8:858a80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8080 r8:8027ecf4 r7:ecbe9e60 r6:85493c80 r5:8580b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0700 INFO: task kworker/0:451:6155 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d72fc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:6187 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc25d84 r8:00000002 r7:60000113 r6:ecc25d8c r5:8580d400 r4:8580d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d32c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85863f8c r4:85863c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85863f8c r4:858a8100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580d400 r8:858a812c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8100 r8:8027ecf4 r7:ecbe9e60 r6:85493d00 r5:8580d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8583d800 INFO: task kworker/0:452:6187 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d72fc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:6211 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:6211 tgid:6211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb45d84 r8:00000002 r7:60000113 r6:ecb45d8c r5:8580e000 r4:8580e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586c38c r4:8586c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586c38c r4:858a8180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580e000 r8:858a81ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8180 r8:8027ecf4 r7:ecbe9e60 r6:85493d80 r5:8580e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d31c0 INFO: task kworker/0:453:6211 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d7cae000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:6212 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:6212 tgid:6212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbddd84 r8:00000002 r7:60000013 r6:ecbddd8c r5:85808c00 r4:85808c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85808c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbdde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85808c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586df8c r4:8586dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586df8c r4:858a8200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808c00 r8:858a822c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8200 r8:8027ecf4 r7:ecb45e60 r6:85493e00 r5:85808c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbddfb0 to 0xecbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3240 INFO: task kworker/0:454:6212 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d7d89000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:6215 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:6215 tgid:6215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd31d84 r8:00000002 r7:60000113 r6:ecd31d8c r5:8580c800 r4:8580c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586c78c r4:8586c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586c78c r4:858a8280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580c800 r8:858a82ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8280 r8:8027ecf4 r7:ecbdde60 r6:85493e80 r5:8580c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3400 INFO: task kworker/0:455:6215 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d8592000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:6217 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:6217 tgid:6217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd39d84 r8:00000002 r7:60000113 r6:ecd39d8c r5:85808000 r4:85808000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85808000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d37c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85808000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586cb8c r4:8586c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586cb8c r4:858a8300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808000 r8:858a832c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8300 r8:8027ecf4 r7:ecbdde60 r6:85493f00 r5:85808000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3480 INFO: task kworker/0:456:6217 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d8b8c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:6219 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:6219 tgid:6219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd41d84 r8:00000002 r7:60000113 r6:ecd41d8c r5:85803000 r4:85803000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85803000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85803000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586cf8c r4:8586cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586cf8c r4:858a8380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85803000 r8:858a83ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8380 r8:8027ecf4 r7:ecbdde60 r6:85493f80 r5:85803000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3640 INFO: task kworker/0:457:6219 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d8f6a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:6221 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:6221 tgid:6221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd49d84 r8:00000002 r7:60000113 r6:ecd49d8c r5:85806000 r4:85806000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85806000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85806000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586d38c r4:8586d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586d38c r4:858a8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85806000 r8:858a842c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8400 r8:8027ecf4 r7:ecbdde60 r6:856c9000 r5:85806000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3780 INFO: task kworker/0:458:6221 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d9960000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:6223 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd51d84 r8:00000002 r7:60000013 r6:ecd51d8c r5:85810c00 r4:85810c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85810c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586d78c r4:8586d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586d78c r4:858a8480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810c00 r8:858a84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8480 r8:8027ecf4 r7:ecbdde60 r6:856c9080 r5:85810c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3980 INFO: task kworker/0:459:6223 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: da026000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:460:6226 blocked for more than 478 seconds. r10:829189c0 r9:ecd5dd84 r8:00000002 r7:60000013 r6:ecd5dd8c r5:85810000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8586db8c r4:858a8500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:6228 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:6228 tgid:6228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd61d84 r8:00000002 r7:60000013 r6:ecd61d8c r5:85811800 r4:85811800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85811800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85811800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586eb8c r4:8586e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586eb8c r4:858a8580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85811800 r8:858a85ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:856d3c80 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:462 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583d300 r5:8586e78c r4:8586e400 r4:858a8600 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0451d20 to 0xe0451d68) 1d20: dad15000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:6235 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:6235 tgid:6235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbc1d84 r8:00000002 r7:60000113 r6:ecbc1d8c r5:85813c00 r4:85813c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85813c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc6c0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8586f78c r4:858a8680 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:463:6235 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:464:6238 blocked for more than 478 seconds. r4:85814800 r5:85814800 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:858a8700 r8:8027ecf4 r7:ecbc1e60 r6:856c9300 r5:85814800 INFO: task kworker/0:464:6238 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d60: 80070013 ffffffff r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:6239 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd71d84 r8:00000002 r7:60000113 r6:ecd71d8c r5:85815400 r4:85815400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85815400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85815400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586f38c r4:8586f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586f38c r4:858a8780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85815400 r8:858a87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8780 r8:8027ecf4 r7:ecbc1e60 r6:856c9380 r5:85815400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd71fb0 to 0xecd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cc440 INFO: task kworker/0:465:6239 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d20: dbc0c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:466:6243 blocked for more than 479 seconds. r5:85816000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:858a8800 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: dbe8f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:6245 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:6245 tgid:6245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd7dd84 r8:00000002 r7:60000113 r6:ecd7dd8c r5:85812400 r4:85812400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85812400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cca40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85812400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587038c r4:85870000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587038c r4:858a8880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85812400 r8:858a88ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8880 r8:8027ecf4 r7:ecd6de60 r6:856c9480 r5:85812400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:468:6247 blocked for more than 479 seconds. r10:829189c0 r9:ecd85d84 r8:00000002 r7:60000013 r6:ecd85d8c r5:85818000 r4:85818000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85818000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85818000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586ff8c r4:8586fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586ff8c r4:858a8900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818000 r8:858a892c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8900 r8:8027ecf4 r7:ecd7de60 r6:856c9500 r5:85818000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd85fb0 to 0xecd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cc640 INFO: task kworker/0:468:6247 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: dc6f6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000